schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-76f4-fw33-6j2v | 2021-10-08T21:23:41Z | 2021-04-19T14:48:26Z | null | [] | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w3hj-wr2q-x83g | 2021-03-30T17:04:34Z | 2021-04-06T17:22:17Z | null | [] | Discovery uses the same AES/GCM Nonce throughout the session | Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer.
From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache):
> The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'tech.pegasys.discovery:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'}] | {'cwe_ids': ['CWE-323'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:04:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hmw2-mvvh-jf5j | 2021-04-08T22:25:20Z | 2021-04-13T15:22:47Z | null | ['CVE-2019-10801'] | OS Command Injection in enpeem | enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'enpeem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:25:20Z', 'nvd_published_at': '2020-02-28T21:15:00Z'} |
1.4.0 | GHSA-5fjj-cfh2-ghc5 | 2021-04-06T22:34:40Z | 2021-04-13T15:25:24Z | null | ['CVE-2020-8128'] | Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport | An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660565'}] | {'cwe_ids': ['CWE-829', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:34:40Z', 'nvd_published_at': '2020-02-14T22:15:00Z'} |
1.4.0 | GHSA-7xc5-ggpp-g249 | 2023-08-07T11:51:29Z | 2021-04-20T16:13:24Z | null | ['CVE-2020-28468'] | pwntools Server-Side Template Injection (SSTI) vulnerability | This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pwntools'}, 'ecosystem_specific': {'affected_functions': ['pwnlib.shellcraft.pretty', 'pwnlib.constants.ConstantsModule.eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28468'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/issues/1427'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/pull/1732'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/commit/138188eb1c027a2d0ffa4151511c407d3a001660'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gallopsled/pwntools'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:11:00Z', 'nvd_published_at': '2021-01-08T12:15:00Z'} |
1.4.0 | GHSA-3c67-gc48-983w | 2023-08-31T20:35:31Z | 2021-04-20T16:44:37Z | null | ['CVE-2020-10691'] | Path Traversal in Ansible | An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running `ansible-galaxy collection` install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68596'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/b2551bb6943eec078066aa3a923e0bb3ed85abe8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:22:26Z', 'nvd_published_at': '2020-04-30T17:15:00Z'} |
1.4.0 | GHSA-mmhj-4w6j-76h7 | 2021-03-30T22:27:45Z | 2021-04-06T17:22:55Z | null | ['CVE-2021-21413'] | Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate | Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.
`Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object.
Similar application-specific attacks could be possible by modifying the local prototype of other API objects.
Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.
To address these issues the following changes were made in v4.0.0:
- Documentation was updated with more explicit guidelines on building secure applications.
- `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies.
- All `isolated-vm` API prototypes are now immutable.
- `NativeModule` constructor may only be invoked from a nodejs isolate. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400'}] | {'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T22:27:45Z', 'nvd_published_at': '2021-03-30T23:15:00Z'} |
1.4.0 | GHSA-2xpj-f5g2-8p7m | 2023-08-30T21:16:22Z | 2021-04-20T16:30:51Z | null | ['CVE-2020-17446'] | Asyncpg Arbitrary Code Execution Via Access to an Uninitialized Pointer | asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'asyncpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/commit/69bcdf5bf7696b98ee708be5408fd7d854e910d0'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html'}] | {'cwe_ids': ['CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:35:20Z', 'nvd_published_at': '2020-08-12T16:15:00Z'} |
1.4.0 | GHSA-rvcw-f68w-8h8h | 2023-03-17T17:49:57Z | 2021-04-19T15:00:05Z | null | ['CVE-2021-29446'] | Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime | ### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jose-node-cjs-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29446'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-cjs-runtime'}] | {'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:33Z', 'nvd_published_at': '2021-04-16T22:15:00Z'} |
1.4.0 | GHSA-3pcr-4982-548m | 2021-04-12T22:33:05Z | 2021-04-13T15:13:37Z | null | [] | Exposure of .env if project root is configured as web root in shopware/production | ### Impact
The .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root.
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
You should always use `/public` as the web root.
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/production'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-3pcr-4982-548m'}] | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-67mq-h2r9-rh2m | 2022-12-03T03:51:28Z | 2021-04-13T15:23:41Z | null | ['CVE-2020-28460'] | Prototype pollution in multi-ini | This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:23:09Z', 'nvd_published_at': '2020-12-22T13:15:00Z'} |
1.4.0 | GHSA-6g3c-2mh5-7q6x | 2023-09-25T16:03:47Z | 2021-04-19T14:56:33Z | null | ['CVE-2021-29451'] | Missing validation of JWT signature in `ManyDesigns/Portofino` | ### Impact
[Portofino](https://github.com/ManyDesigns/Portofino) is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens.
This allows forging a valid JWT.
### Patches
The issue will be patched in the upcoming 5.2.1 release.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/ManyDesigns/Portofino](https://github.com/ManyDesigns/Portofino) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-dispatcher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.manydesigns/portofino'}] | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:13Z', 'nvd_published_at': '2021-04-16T22:15:00Z'} |
1.4.0 | GHSA-vp77-fqqp-79j8 | 2021-03-22T22:39:06Z | 2021-04-13T15:20:27Z | null | ['CVE-2020-28449'] | Prototype Pollution in decal | This affects all versions of package decal. The vulnerability is in the set function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}] | {'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:39:06Z', 'nvd_published_at': '2021-02-04T15:15:00Z'} |
1.4.0 | GHSA-wq5h-f9p5-q7fx | 2023-04-21T15:24:43Z | 2021-04-20T14:02:30Z | null | ['CVE-2021-29434'] | Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields | ### Impact
When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
### Workarounds
For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app:
```python
from draftjs_exporter.dom import DOM
from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler
from wagtail.core import hooks
from wagtail.core.whitelist import check_url
def link_entity(props):
id_ = props.get('id')
link_props = {}
if id_ is not None:
link_props['linktype'] = 'page'
link_props['id'] = id_
else:
link_props['href'] = check_url(props.get('url'))
return DOM.create_element('a', link_props, props['children'])
@hooks.register('register_rich_text_features', order=1)
def register_link(features):
features.register_converter_rule('contentstate', 'link', {
'from_database_format': {
'a[href]': ExternalLinkElementHandler('LINK'),
'a[linktype="page"]': PageLinkElementHandler('LINK'),
},
'to_database_format': {
'entity_decorators': {'LINK': link_entity}
}
})
```
### Acknowledgements
Many thanks to Kevin Breen for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.6'}}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '2.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5c7a60977cba478f6a35390ba98cffc2bd41c8a4'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/915f6ed2bd7d53154103cc4424a0f18695cdad6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wagtail/wagtail'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/compare/v2.11.6...v2.11.7'}, {'type': 'WEB', 'url': 'https://pypi.org/project/wagtail/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T18:46:26Z', 'nvd_published_at': '2021-04-19T19:15:00Z'} |
1.4.0 | GHSA-jh5x-hfhg-78jq | 2023-07-05T23:21:42Z | 2021-04-22T16:20:50Z | null | ['CVE-2020-28948'] | Deserialization of Untrusted Data in Archive_Tar | Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4817'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-013'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:18:26Z', 'nvd_published_at': '2020-11-19T19:15:00Z'} |
1.4.0 | GHSA-cwg9-c9cr-p5fq | 2021-03-26T23:20:56Z | 2021-04-13T15:18:53Z | null | ['CVE-2021-28161'] | Improper Neutralization of Input in Theia console | In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@theia/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/8794'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:20:56Z', 'nvd_published_at': '2021-03-12T22:15:00Z'} |
1.4.0 | GHSA-5c66-v29h-xjh8 | 2021-04-20T18:36:33Z | 2021-04-22T16:11:55Z | null | ['CVE-2021-29459'] | XSS Cross Site Scripting | ### Impact
It is possible to persistently inject scripts in XWiki.
For unregistred users:
- By filling simple text fields
For registered users:
- By filling their personal information
- (if they have edit rights) By filling the values of static lists using App Within Minutes
That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities.
That can also lead to the attacker taking over an account.
If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account.
### Patches
It has been patched on XWiki 12.8 and 12.6.3.
### Workarounds
There is no easy workaround except upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-17374
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at our [security mailing list](mailto:security@xwiki.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:36:33Z', 'nvd_published_at': '2021-04-20T19:15:00Z'} |
1.4.0 | GHSA-wgpj-7c2j-vfjm | 2023-09-05T14:29:48Z | 2021-04-08T16:33:38Z | null | ['CVE-2021-30185'] | Indico Tampering with links (e.g. password reset) in sent emails | ### Impact
An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account.
- If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide)
- If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though)
### Patches
You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible.
See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update.
### Workarounds
You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config.
### For more information
If you have any questions or comments about this advisory:
- Open a thread in [our forum](https://talk.getindico.io/)
- Email us privately at indico-team@cern.ch | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'indico'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/releases/tag/v2.3.4'}, {'type': 'WEB', 'url': 'https://www.shorebreaksecurity.com/blog/'}] | {'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:33:24Z', 'nvd_published_at': '2021-04-07T14:15:00Z'} |
1.4.0 | GHSA-4jj4-m52p-8rx3 | 2021-04-07T22:31:58Z | 2021-04-13T15:24:08Z | null | ['CVE-2020-28281'] | Prototype pollution in set-object-value | Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-object-value'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'}, {'type': 'WEB', 'url': 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:31:58Z', 'nvd_published_at': '2020-12-29T18:15:00Z'} |
1.4.0 | GHSA-7mx5-x372-xh87 | 2021-04-08T20:26:23Z | 2021-04-20T16:40:27Z | null | ['CVE-2020-17526'] | Incorrect Session Validation in Apache Airflow | Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17526'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/21/1'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:26:23Z', 'nvd_published_at': '2020-12-21T17:15:00Z'} |
1.4.0 | GHSA-jff2-qjw8-5476 | 2021-04-29T17:22:56Z | 2021-04-06T17:30:14Z | null | ['CVE-2021-21388'] | Command Injection Vulnerability in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:19:25Z', 'nvd_published_at': '2021-04-29T18:15:00Z'} |
1.4.0 | GHSA-x7wf-5mjc-6x76 | 2021-04-07T19:31:51Z | 2021-04-07T21:13:44Z | null | ['CVE-2020-28735'] | SSRF attacks via tracebacks in Plone | Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28735'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:31:51Z', 'nvd_published_at': '2020-12-30T19:15:00Z'} |
1.4.0 | GHSA-6rv4-4qv6-88g2 | 2021-04-12T17:39:01Z | 2021-04-12T17:39:19Z | null | ['CVE-2021-25913'] | Prototype Pollution in set-or-get | Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-or-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/set-or-get'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T17:38:22Z', 'nvd_published_at': '2021-02-08T22:15:00Z'} |
1.4.0 | GHSA-4gfq-6m28-m5mg | 2021-03-19T23:11:49Z | 2021-04-13T15:16:11Z | null | ['CVE-2020-7775'] | Improper neutralization of arguments in freediskspace | This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'freediskspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T23:11:49Z', 'nvd_published_at': '2021-02-02T19:15:00Z'} |
1.4.0 | GHSA-cq8r-fc3q-6hg2 | 2021-04-06T20:51:59Z | 2021-04-13T15:29:40Z | null | ['CVE-2020-28479'] | Denial of Service (DoS) via the unsetByPath function in jsjoints | The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:51:59Z', 'nvd_published_at': '2021-01-19T15:15:00Z'} |
1.4.0 | GHSA-j32x-j8pj-pg2h | 2021-03-22T22:36:42Z | 2021-04-13T15:20:34Z | null | ['CVE-2020-28450'] | Prototype Pollution in decal | This affects all versions of package decal. The vulnerability is in the extend function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js#L23-L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051028'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}] | {'cwe_ids': ['CWE-1321', 'CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:36:42Z', 'nvd_published_at': '2021-02-04T15:15:00Z'} |
1.4.0 | GHSA-p62g-jhg6-v3rq | 2023-08-31T20:32:30Z | 2021-04-07T20:37:06Z | null | ['CVE-2020-10684'] | Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible | A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10684'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a9d2ceafe429171c0e2ad007058b88bae57c74ce'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-250', 'CWE-362', 'CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:46:48Z', 'nvd_published_at': '2020-03-24T14:15:00Z'} |
1.4.0 | GHSA-crh4-294p-vcfq | 2021-10-08T21:22:01Z | 2021-04-19T14:53:20Z | null | [] | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2021-31405 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow-components'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hv7-3q38-97m8 | 2021-04-06T23:35:22Z | 2021-04-13T15:24:47Z | null | ['CVE-2020-28464'] | Arbitrary code execution in djv | This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'djv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/pull/98/files'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJV-1014545'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:35:22Z', 'nvd_published_at': '2021-01-04T12:15:00Z'} |
1.4.0 | GHSA-xmxh-g7wj-8m4m | 2021-04-13T15:32:15Z | 2021-04-13T15:32:26Z | null | ['CVE-2019-10789'] | OS Command Injection in curling | npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'curling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789'}, {'type': 'WEB', 'url': 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:13:03Z', 'nvd_published_at': '2020-02-06T16:15:00Z'} |
1.4.0 | GHSA-7cj4-gj8m-m2f7 | 2021-08-31T21:06:39Z | 2021-04-22T16:13:23Z | null | ['CVE-2020-17510'] | Authentication bypass in Apache Shiro | Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:21:47Z', 'nvd_published_at': '2020-11-05T21:15:00Z'} |
1.4.0 | GHSA-934w-hvj4-7fr6 | 2021-08-02T15:38:02Z | 2021-04-13T15:25:15Z | null | ['CVE-2020-7762'] | Path Traversal in jsreport-chrome-pdf | This affects the package jsreport-chrome-pdf before 1.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsreport-chrome-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}, {'type': 'WEB', 'url': 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:36:49Z', 'nvd_published_at': '2020-11-05T13:15:00Z'} |
1.4.0 | GHSA-ghhp-997w-qr28 | 2021-04-21T19:37:39Z | 2021-04-21T19:38:01Z | null | ['CVE-2021-26701'] | .NET Core Remote Code Execution Vulnerability | .NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
### Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.
### Discussion
Discussion for this issue can be found at dotnet/runtime#49377
### Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
### Affected software
The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.
Vulnerable package versions:
Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.
Package Name | Vulnerable Versions | Secure Versions
-|-|-
System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1
System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2
System.Text.Encodings.Web | 5.0.0 | 5.0.1
Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/178'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:37:39Z', 'nvd_published_at': '2021-02-25T23:15:00Z'} |
1.4.0 | GHSA-xv5h-v7jh-p2qh | 2021-05-10T15:11:26Z | 2021-04-27T20:09:25Z | null | ['CVE-2021-29442'] | Authentication bypass for specific endpoint | The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L133-L135) endpoint is properly protected with the `@Secured` annotation, the [`/derby`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L99-L100) endpoint is not protected and can be openly accessed by unauthenticated users.
For example, the following request will list the tables of the database:
```
❯ curl -X GET 'http://console.nacos.io/nacos/v1/cs/ops/derby?sql=select+st.tablename+from+sys.systables+st'
{"code":200,"message":null,"data":[{"TABLENAME":"APP_CONFIGDATA_RELATION_PUBS"},{"TABLENAME":"APP_CONFIGDATA_RELATION_SUBS"},{"TABLENAME":"APP_LIST"},{"TABLENAME":"CONFIG_INFO"},{"TABLENAME":"CONFIG_INFO_AGGR"},{"TABLENAME":"CONFIG_INFO_BETA"},{"TABLENAME":"CONFIG_INFO_TAG"},{"TABLENAME":"CONFIG_TAGS_RELATION"},{"TABLENAME":"GROUP_CAPACITY"},{"TABLENAME":"HIS_CONFIG_INFO"},{"TABLENAME":"PERMISSIONS"},{"TABLENAME":"ROLES"},{"TABLENAME":"SYSALIASES"},{"TABLENAME":"SYSCHECKS"},{"TABLENAME":"SYSCOLPERMS"},{"TABLENAME":"SYSCOLUMNS"},{"TABLENAME":"SYSCONGLOMERATES"},{"TABLENAME":"SYSCONSTRAINTS"},{"TABLENAME":"SYSDEPENDS"},{"TABLENAME":"SYSDUMMY1"},{"TABLENAME":"SYSFILES"},{"TABLENAME":"SYSFOREIGNKEYS"},{"TABLENAME":"SYSKEYS"},{"TABLENAME":"SYSPERMS"},{"TABLENAME":"SYSROLES"},{"TABLENAME":"SYSROUTINEPERMS"},{"TABLENAME":"SYSSCHEMAS"},{"TABLENAME":"SYSSEQUENCES"},{"TABLENAME":"SYSSTATEMENTS"},{"TABLENAME":"SYSSTATISTICS"},{"TABLENAME":"SYSTABLEPERMS"},{"TABLENAME":"SYSTABLES"},{"TABLENAME":"SYSTRIGGERS"},{"TABLENAME":"SYSUSERS"},{"TABLENAME":"SYSVIEWS"},{"TABLENAME":"TENANT_CAPACITY"},{"TABLENAME":"TENANT_INFO"},{"TABLENAME":"USERS"}]}%
```
These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql) | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29442'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4463'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4517'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-rv39-3qh7-9v7w | 2022-02-08T22:03:58Z | 2021-04-30T17:29:51Z | null | ['CVE-2020-5421'] | Improper Input Validation in Spring Framework | In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.17'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0009/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5421'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-35'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:06:49Z', 'nvd_published_at': '2020-09-19T04:15:00Z'} |
1.4.0 | GHSA-36hp-jr8h-556f | 2021-05-10T14:56:08Z | 2021-04-27T20:09:17Z | null | ['CVE-2021-29441'] | Authentication Bypass | When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed.
The following request to the `configuration` endpoint gets rejected as we are not providing any credentials:
```
❯ curl -X POST "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
{"timestamp":"2020-12-02T14:33:57.154+0000","status":403,"error":"Forbidden","message":"unknown user!","path":"/nacos/v1/cs/configs"}
```
However the following one gets accepted by using the `Nacos-Server` user-agent header:
```
❯ curl -X POST -A Nacos-Server "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
true
```
#### Impact
This issue may allow any user to carry out any administrative tasks on the Nacos server. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4701'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}] | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:38Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-3pqx-4fqf-j49f | 2022-01-04T19:49:51Z | 2021-04-20T16:40:42Z | null | ['CVE-2019-20477'] | Deserialization of Untrusted Data in PyYAML | PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/download/47655'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T19:24:04Z', 'nvd_published_at': '2020-02-19T04:15:00Z'} |
1.4.0 | GHSA-gg2g-m5wc-vccq | 2021-04-16T22:53:30Z | 2021-04-06T18:36:40Z | null | ['CVE-2021-21423'] | Rebuild-bot workflow may allow unauthorised repository modifications | ### Impact
`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the "main" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the "main" repository.
The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made).
Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch.
### Patches
The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow.
### Workarounds
The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue.
### References
The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem.
[1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'projen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.41'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}, {'type': 'WEB', 'url': 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/projen'}] | {'cwe_ids': ['CWE-527'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:36:19Z', 'nvd_published_at': '2021-04-06T19:15:00Z'} |
1.4.0 | GHSA-77g3-3j5w-64w4 | 2021-08-31T21:10:36Z | 2021-04-07T20:36:46Z | null | ['CVE-2020-10685'] | Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible | A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68433'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-377', 'CWE-459', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:11:30Z', 'nvd_published_at': '2020-05-11T14:15:00Z'} |
1.4.0 | GHSA-7fjp-g4m7-fx23 | 2021-04-12T20:05:57Z | 2021-04-13T15:12:26Z | null | [] | User (Encrypted) Password Field Being Serialised | ### Impact
Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed.
### Patches
Issue has been patched in version 0.3.7-beta and onwards.
### Workarounds
Add the 'password' field to the Users model file in the hidden array:
```php
/**
* The attributes that should be hidden for arrays.
*
* @var array
*/
protected $hidden = [
'remember_token',
'password',
];
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core)
* Email us at [security@pw-websolutions.com](mailto:security@pw-websolutions.com) | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'pwweb/laravel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6-beta'}}] | [{'type': 'WEB', 'url': 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:05:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7vx-j8mp-3h2x | 2021-03-29T22:11:05Z | 2021-04-13T15:18:01Z | null | ['CVE-2019-17636'] | Insufficient Verification of Data Authenticity in Eclipse Theia | In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requesters origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17636'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7205'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:05Z', 'nvd_published_at': '2020-03-10T15:15:00Z'} |
1.4.0 | GHSA-45w5-pvr8-4rh5 | 2021-03-26T22:09:16Z | 2021-04-13T15:19:14Z | null | ['CVE-2021-26275'] | Command injection in eslint-fixer | The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'eslint-fixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/eslint-fixer'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:09:16Z', 'nvd_published_at': '2021-03-19T00:15:00Z'} |
1.4.0 | GHSA-rmp7-f2vp-3rq4 | 2023-08-30T22:09:23Z | 2021-04-20T16:31:54Z | null | ['CVE-2021-25925'] | Cross-site scripting in SiCKRAGE | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:56:03Z', 'nvd_published_at': '2021-04-12T14:15:00Z'} |
1.4.0 | GHSA-43ch-2h55-2vj7 | 2021-03-29T21:49:55Z | 2021-04-13T15:18:17Z | null | ['CVE-2020-28360'] | Server-Side Request Forgery in private-ip | Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'private-ip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip'}, {'type': 'WEB', 'url': 'https://johnjhacking.com/blog/cve-2020-28360/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/private-ip'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:49:55Z', 'nvd_published_at': '2020-11-23T21:15:00Z'} |
1.4.0 | GHSA-h73g-8g27-xxcx | 2021-04-08T21:59:12Z | 2021-04-13T15:22:58Z | null | ['CVE-2020-28439'] | Command injection in corenlp-js-prefab | This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'corenlp-js-prefab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28439'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:59:12Z', 'nvd_published_at': '2020-12-11T17:15:00Z'} |
1.4.0 | GHSA-836c-xg97-8p4h | 2023-08-07T13:07:47Z | 2021-04-30T17:34:48Z | null | ['CVE-2020-27197'] | libtaxii Server-Side Request Forgery vulnerability | "TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group."" | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'libtaxii'}, 'ecosystem_specific': {'affected_functions': ['libtaxii.common.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.118'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27197'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/eclecticiq/OpenTAXII/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/commit/23c6f7b69d99e965c8d53dc4710ae64da3fb4842'}, {'type': 'PACKAGE', 'url': 'https://github.com/TAXIIProject/libtaxii'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:53:43Z', 'nvd_published_at': '2020-10-17T20:15:00Z'} |
1.4.0 | GHSA-qfxv-qqvg-24pg | 2021-03-29T22:57:19Z | 2021-04-13T15:17:36Z | null | ['CVE-2019-10788'] | OS Command Injection in im-metadata | im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'im-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:57:19Z', 'nvd_published_at': '2020-02-04T21:15:00Z'} |
1.4.0 | GHSA-vwfx-hh3w-fj99 | 2021-03-31T17:35:42Z | 2021-04-06T17:24:14Z | null | ['CVE-2021-21418'] | Potential XSS injection in the newsletter conditions field | ### Impact
An employee can inject javascript in the newsletter condition field that will then be executed on the front office
### Patches
The issue has been fixed in 2.6.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_emailsubscription'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/ps_emailsubscription'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:35:42Z', 'nvd_published_at': '2021-03-31T18:15:00Z'} |
1.4.0 | GHSA-75xc-qvxh-27f8 | 2021-04-16T23:15:02Z | 2021-04-19T14:51:06Z | null | ['CVE-2021-31403'] | Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack
- https://vaadin.com/security/cve-2021-31403 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12188'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12190'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31403'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:02Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-58f5-hfqc-jgch | 2021-04-16T23:01:38Z | 2021-04-19T14:57:22Z | null | ['CVE-2021-29443'] | Padding Oracle Attack due to Observable Timing Discrepancy in jose | jose is an npm library providing a number of cryptographic operations.
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`.
Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4)
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose'}] | {'cwe_ids': ['CWE-203', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:01:38Z', 'nvd_published_at': '2021-04-16T18:15:00Z'} |
1.4.0 | GHSA-7jgj-8wvc-jh57 | 2021-04-21T19:15:50Z | 2021-04-21T19:16:06Z | null | ['CVE-2018-8292'] | .NET Core Information Disclosure | An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/88'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2902'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105548'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:15:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6hrm-jqp3-64cv | 2023-01-26T22:35:31Z | 2021-04-13T15:42:36Z | null | ['CVE-2020-24393'] | Improper Certificate Validation in TweetStream | TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'tweetstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}, {'type': 'PACKAGE', 'url': 'https://github.com/tweetstream/tweetstream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:54:38Z', 'nvd_published_at': '2021-02-19T23:15:00Z'} |
1.4.0 | GHSA-qg7c-q3vq-rgxr | 2021-04-12T22:32:54Z | 2021-04-13T15:13:26Z | null | [] | Leak of information via Store-API aggregations in shopware/platform and shopware/core | ### Impact
Leak of information via Store-API
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr'}] | {'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:32:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8hw9-22v6-9jr9 | 2021-04-16T23:04:15Z | 2021-04-19T15:14:33Z | null | ['CVE-2021-29452'] | Any logged in user could edit any other logged in user. | ### Impact
Everyone who is running a12n-server.
A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change.
### Patches
Patched in v0.18.2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@curveball/a12n-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@curveball/a12n-server'}] | {'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:04:15Z', 'nvd_published_at': '2021-04-16T22:15:00Z'} |
1.4.0 | GHSA-4vp3-vfww-8648 | 2021-04-09T22:11:38Z | 2021-04-13T15:48:05Z | null | ['CVE-2020-29454'] | Incorrect permission enforcement in UmbracoCms | Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:11:38Z', 'nvd_published_at': '2020-12-02T02:15:00Z'} |
1.4.0 | GHSA-35mm-cc6r-8fjp | 2023-08-08T15:34:06Z | 2021-04-07T20:58:47Z | null | ['CVE-2020-8264'] | Cross-site scripting in actionpack | In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the Actionable Exceptions middleware in their development environment via a line such as this one in their config/environment/development.rb: `config.middleware.delete ActionDispatch::ActionableExceptions` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/904059'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8264.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:19:13Z', 'nvd_published_at': '2021-01-06T21:15:00Z'} |
1.4.0 | GHSA-25xc-jwfq-39jw | 2022-08-15T20:03:44Z | 2021-04-19T14:50:49Z | null | ['CVE-2021-31407'] | OSGi applications using Vaadin 12-14 and 19 vulnerable to server classes and resources exposure | Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
- https://vaadin.com/security/cve-2021-31407 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/osgi/issues/50'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10229'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10269'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}] | {'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:42Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-64x2-gq24-75pv | 2021-04-20T22:19:53Z | 2021-04-22T16:15:23Z | null | ['CVE-2020-13954'] | Cross-site scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0010/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/11/12/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:19:53Z', 'nvd_published_at': '2020-11-12T13:15:00Z'} |
1.4.0 | GHSA-h8hx-2c5r-32cf | 2021-04-13T17:01:38Z | 2021-04-13T17:01:50Z | null | ['CVE-2021-29435'] | Cross-Site Request Forgery (CSRF) in trestle-auth | ### Impact
A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
### Patches
The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues)
* Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'trestle-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435'}, {'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/trestle-auth/CVE-2021-29435.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/trestle-auth'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:01:38Z', 'nvd_published_at': '2021-04-13T20:15:00Z'} |
1.4.0 | GHSA-c6c4-7x48-4cqp | 2021-10-08T21:24:15Z | 2021-04-19T14:47:47Z | null | [] | Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
- https://vaadin.com/security/cve-2021-31404 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}] | {'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-67mm-m3wx-j7fr | 2022-04-27T19:13:33Z | 2021-04-13T15:15:29Z | null | ['CVE-2021-26541'] | Command injection in gitlog | The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gitlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26541'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4301'}, {'type': 'PACKAGE', 'url': 'https://github.com/domharrington/node-gitlog'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitlog'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:05:05Z', 'nvd_published_at': '2021-02-08T17:15:00Z'} |
1.4.0 | GHSA-qr9h-vr5p-pwwx | 2022-04-18T21:56:34Z | 2021-04-12T18:59:11Z | null | ['CVE-2020-27543'] | Denial of Service (DoS) in restify-paginate | The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'restify-paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27543'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulvarache/restify-paginate/'}, {'type': 'WEB', 'url': 'https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/restify-paginate'}] | {'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:59Z', 'nvd_published_at': '2021-02-25T17:15:00Z'} |
1.4.0 | GHSA-mm4f-47ch-f7hx | 2022-07-05T18:00:53Z | 2021-04-13T15:32:43Z | null | ['CVE-2021-23363'] | Arbitrary code execution in kill-by-port | This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'kill-by-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/GuyMograbi/kill-by-port'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js#23L8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531'}] | {'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:18:57Z', 'nvd_published_at': '2021-03-30T15:15:00Z'} |
1.4.0 | GHSA-c9g6-9335-x697 | 2021-04-06T21:47:25Z | 2021-04-13T15:27:51Z | null | ['CVE-2020-7693'] | Improper Input Validation in SocksJS-Node | Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/issues/252'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/pull/265'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}, {'type': 'WEB', 'url': 'https://github.com/andsnw/sockjs-dos-py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:47:25Z', 'nvd_published_at': '2020-07-09T14:15:00Z'} |
1.4.0 | GHSA-m496-x567-f98c | 2021-04-30T20:19:58Z | 2021-04-22T16:10:49Z | null | ['CVE-2021-21426'] | Fixes a bug in Zend Framework's Stream HTTP Wrapper | ### Impact
CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007
This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
v20.0.9 v19.4.13 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}] | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21426'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:16:53Z', 'nvd_published_at': '2021-04-21T21:15:00Z'} |
1.4.0 | GHSA-xgxc-v2qg-chmh | 2021-04-30T20:43:54Z | 2021-04-08T18:11:48Z | null | ['CVE-2021-28658'] | Directory Traversal in Django | In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Django/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/apr/06/security-releases/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T18:11:26Z', 'nvd_published_at': '2021-04-06T15:15:00Z'} |
1.4.0 | GHSA-9w49-m7xh-5r39 | 2021-04-09T21:59:25Z | 2021-04-20T16:37:56Z | null | ['CVE-2020-29456'] | Cross-site scripting in papermerge | Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'papermerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29456'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/releases/tag/v1.5.2'}, {'type': 'WEB', 'url': 'https://www.papermerge.com/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:59:25Z', 'nvd_published_at': '2020-12-02T08:15:00Z'} |
1.4.0 | GHSA-73xv-w5gp-frxh | 2022-02-08T22:01:10Z | 2021-04-30T16:14:15Z | null | ['CVE-2020-28052'] | Logic error in Legion of the Bouncy Castle BC Java | An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/'}] | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T00:15:55Z', 'nvd_published_at': '2020-12-18T01:15:00Z'} |
1.4.0 | GHSA-jxg6-fhwc-9v9c | 2021-03-23T19:29:27Z | 2021-04-13T15:19:39Z | null | ['CVE-2020-28501'] | Regular Expression Denial of Service (ReDoS) in es6-crawler-detect | This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'es6-crawler-detect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}, {'type': 'WEB', 'url': 'https://github.com/JefferyHus/es6-crawler-detect/pull/27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T19:29:27Z', 'nvd_published_at': '2021-03-22T12:15:00Z'} |
1.4.0 | GHSA-26vr-8j45-3r4w | 2022-08-10T23:33:55Z | 2021-04-06T17:31:30Z | null | ['CVE-2021-28165'] | Jetty vulnerable to incorrect handling of invalid large TLS frame, exhausting CPU resources | ### Impact
When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage.
### Workarounds
The problem can be worked around by compiling the following class:
```java
package org.eclipse.jetty.server.ssl.fix6072;
import java.nio.ByteBuffer;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLEngineResult;
import javax.net.ssl.SSLException;
import javax.net.ssl.SSLHandshakeException;
import org.eclipse.jetty.io.EndPoint;
import org.eclipse.jetty.io.ssl.SslConnection;
import org.eclipse.jetty.server.Connector;
import org.eclipse.jetty.server.SslConnectionFactory;
import org.eclipse.jetty.util.BufferUtil;
import org.eclipse.jetty.util.annotation.Name;
import org.eclipse.jetty.util.ssl.SslContextFactory;
public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory
{
public SpaceCheckingSslConnectionFactory(@Name("sslContextFactory") SslContextFactory factory, @Name("next") String nextProtocol)
{
super(factory, nextProtocol);
}
@Override
protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine)
{
return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption())
{
@Override
protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException
{
SSLEngineResult results = super.unwrap(sslEngine, input, output);
if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW ||
results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) &&
BufferUtil.space(input) == 0)
{
BufferUtil.clear(input);
throw new SSLHandshakeException("Encrypted buffer max length exceeded");
}
return results;
}
};
}
}
```
This class can be deployed by:
+ The resulting class file should be put into a jar file (eg sslfix6072.jar)
+ The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib
+ Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules`
+ Edit the `${jetty.base}/modules/ssl.mod` file to have the following section:
```
[lib]
lib/sslfix6072.jar
```
+ Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc`
+ Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example:
```xml
<Call name="addIfAbsentConnectionFactory">
<Arg>
<New class="org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory">
<Arg name="next">http/1.1</Arg>
<Arg name="sslContextFactory"><Ref refid="sslContextFactory"/></Arg>
</New>
</Arg>
</Call>
```
+ Restart Jetty | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.2'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/20/3'}] | {'cwe_ids': ['CWE-400', 'CWE-551', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:02:13Z', 'nvd_published_at': '2021-04-01T15:15:00Z'} |
1.4.0 | GHSA-8cr8-4vfw-mr7h | 2022-08-22T19:43:17Z | 2021-04-30T17:30:37Z | null | ['CVE-2021-28965'] | REXML round-trip instability | The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rexml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1104077'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rexml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2021-28965.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/rexml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0003/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/'}] | {'cwe_ids': ['CWE-115', 'CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:31:39Z', 'nvd_published_at': '2021-04-21T07:15:00Z'} |
1.4.0 | GHSA-58c7-px5v-82hh | 2023-03-30T14:48:14Z | 2021-04-06T17:28:59Z | null | ['CVE-2021-21416'] | Potential sensitive information disclosed in error reports | django-registration is a user-registration application for Django.
### Impact
The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django.
Triggering this requires the following conditions:
* A site is using django-registration < 3.1.2
* The site has detailed error reports (such as Django's [emailed error reports to site staff/developers](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#email-reports)) enabled
* A server-side error (HTTP 5xx) occurs during an attempt by a user to register an account
Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password).
### Patches
As of version 3.1.2, django-registration properly applies Django's `sensitive_post_parameters()` decorator to the base user-registration view, which will cause all data from the HTTP request body to be filtered from detailed error reports in the event of a server-side crash during user account registration.
Note that as applied, this filters *all* HTTP request data from error reports. To selectively allow some fields but not others, see Django's own documentation (in references) and the notes below for how to apply `sensitive_post_parameters()` manually to a particular codebase's `RegistrationView` subclass(es).
### Workarounds
Users who cannot upgrade quickly can apply the `django.views.decorators.debug.sensitive_post_parameters()` decorator to their own registration views. The decorator should be applied on the `dispatch()` method of the appropriate `RegistrationView` class, using Django's `method_decorator()` helper. For example:
```python
from django.utils.decorators import method_decorator
from django.views.decorators.debug import sensitive_post_parameters
from django_registration.views import RegistrationView
class MyRegistrationView(RegistrationView):
"""
A RegistrationView subclass manually protected against sensitive information disclosure
in error reports.
"""
@method_decorator(sensitive_post_parameters())
def dispatch(self, *args, **kwargs):
return super().dispatch(*args, **kwargs)
```
### References
* Django's documentation on [error reporting in production](https://docs.djangoproject.com/en/3.1/howto/error-reporting/)
* [How Django's sensitive-data filters work](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#filtering-error-reports) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-registration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416'}, {'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/commit/2db0bb7ec35636ea46b07b146328b87b2cb13ca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ubernostrum/django-registration'}] | {'cwe_ids': ['CWE-201', 'CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:03:08Z', 'nvd_published_at': '2021-04-01T22:15:00Z'} |
1.4.0 | GHSA-ph32-23p8-9rw5 | 2021-07-28T18:30:26Z | 2021-04-13T15:17:45Z | null | ['CVE-2019-10786'] | Improper Input Validation in network-manager | network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'network-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}] | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:36:25Z', 'nvd_published_at': '2020-02-04T21:15:00Z'} |
1.4.0 | GHSA-78vq-9j56-wrfr | 2023-08-29T12:13:04Z | 2021-04-30T17:29:15Z | null | ['CVE-2020-25739'] | Gon gem lack of escaping certain input when outputting as JSON | An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}, {'type': 'WEB', 'url': 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gazay/gon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gon/CVE-2020-25739.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4560-1/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T15:05:22Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-r96p-v3cr-gfv8 | 2021-07-29T20:42:20Z | 2021-04-13T15:28:01Z | null | ['CVE-2020-28470'] | Cross-site Scripting (XSS) in @scullyio/scully | This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@scullyio/scully'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470'}, {'type': 'WEB', 'url': 'https://github.com/scullyio/scully/pull/1182'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:40:15Z', 'nvd_published_at': '2021-01-14T10:15:00Z'} |
1.4.0 | GHSA-gqvf-892r-vjm5 | 2023-07-05T19:26:32Z | 2021-04-13T15:42:19Z | null | ['CVE-2020-7942'] | Improper Certificate Validation in Puppet | Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2020-7942.yml'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2020-7942/'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:15:22Z', 'nvd_published_at': '2020-02-19T21:15:00Z'} |
1.4.0 | GHSA-72rj-36qc-47g7 | 2023-08-25T22:09:00Z | 2021-04-27T15:54:52Z | null | ['CVE-2021-31671'] | Pgsync Contains Cleartext Transmission of Sensitive Information | pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the `--schema-first` and `--schema-only` options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'pgsync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/issues/121'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pgsync/CVE-2021-31671.yml'}] | {'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T15:54:16Z', 'nvd_published_at': '2021-04-27T03:15:00Z'} |
1.4.0 | GHSA-333x-qr3v-g4xx | 2021-04-05T19:04:46Z | 2021-04-13T15:30:16Z | null | ['CVE-2020-7782'] | Command injection in spritesheet-js | This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'spritesheet-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782'}, {'type': 'WEB', 'url': 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/spritesheet-js'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T19:04:46Z', 'nvd_published_at': '2021-02-08T19:15:00Z'} |
1.4.0 | GHSA-9jhm-8m8c-c3f4 | 2021-04-15T21:00:29Z | 2021-04-19T14:54:15Z | null | ['CVE-2021-29431'] | SSRF in Sydent due to missing validation of hostnames | ### Impact
Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
### Patches
Fixed in 9e57334, 8936925, 3d531ed, 0f00412
### Workarounds
A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}] | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:00:29Z', 'nvd_published_at': '2021-04-15T21:15:00Z'} |
1.4.0 | GHSA-7mpx-vg3c-cmr4 | 2021-04-09T19:38:58Z | 2021-04-13T15:22:37Z | null | ['CVE-2020-7787'] | Improper Authentication in react-adal | This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-adal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T19:38:58Z', 'nvd_published_at': '2020-12-09T17:15:00Z'} |
1.4.0 | GHSA-4v4g-726h-xvfv | 2023-03-17T17:49:46Z | 2021-04-19T14:59:06Z | null | ['CVE-2021-29445'] | Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime | ### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jose-node-esm-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-esm-runtime'}] | {'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:41Z', 'nvd_published_at': '2021-04-16T22:15:00Z'} |
1.4.0 | GHSA-893h-35v4-mxqx | 2023-08-31T20:01:05Z | 2021-04-20T16:43:33Z | null | ['CVE-2020-1737'] | Path Traversal in Ansible | A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67795'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67799'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:58:06Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-g4mq-6fp5-qwcf | 2021-08-31T21:10:23Z | 2021-04-20T16:46:12Z | null | ['CVE-2020-1733'] | Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible | A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67791'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:50:43Z', 'nvd_published_at': '2020-03-11T19:15:00Z'} |
1.4.0 | GHSA-x823-j7c4-vpc5 | 2023-08-30T22:10:24Z | 2021-04-20T16:31:43Z | null | ['CVE-2021-25926'] | Cross-site scripting in sickrage | In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.54'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:57:46Z', 'nvd_published_at': '2021-04-12T14:15:00Z'} |
1.4.0 | GHSA-375m-5fvv-xq23 | 2021-04-16T23:17:39Z | 2021-04-19T15:11:54Z | null | [] | VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption | ## Background
@tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies.
### Impact
If you are an end user of a forwarder-style proxy deployed using Vyper's built-in `create_forwarder_to` function AND you have a function that returns >4096 bytes AND you do no return data sanitation on the value returned, you could potentially see a data corruption issue.
Otherwise, if you are handling the result of a return call AND you expect a specific `RETURNDATASIZE` that is less than 4096 (such as `SafeERC20.safeTransfer`) then the call will fail that check.
### Patches
The issue was patched when we upgraded to EIP-1167 style forwarder proxies in #2281.
### Workarounds
If you are making a call to a contract method that is expected to return <= 4096 bytes, there is no issue as the ABI decoders in both Solidity and Vyper will truncate the data properly. Web3 libraries will also do this, unless you are doing `eth_call` or `eth_sendTransaction` directly.
If you are using a Solidity library that checks `RETURNDATASIZE` of an external call to a forwarder proxy deployed prior to this patch, it will fail on that assertion (such as `SafeERC20.safeTransfer`). The workaround is to always do a greater than or equal to check, rather than a strict equals to check. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2281'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wq6x-g685-w5f2 | 2021-04-07T19:34:40Z | 2021-04-07T21:13:00Z | null | ['CVE-2020-28734'] | Improper Restriction of XML External Entity Reference in Plone | Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:34:40Z', 'nvd_published_at': '2020-12-30T19:15:00Z'} |
1.4.0 | GHSA-p7jq-v8jp-j424 | 2021-04-16T23:15:49Z | 2021-04-19T14:50:38Z | null | ['CVE-2021-31406'] | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10157'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:49Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-867q-77cc-98mv | 2021-05-10T19:29:52Z | 2021-04-29T21:51:37Z | null | ['CVE-2021-21429'] | Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin | ### Impact
Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS.
OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system.
The impact of this vulnerability is information disclosure of the contents of the specification file to other local users.
### Patches
The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/)
* Email us at [security@openapitools.org](mailto:security@openapitools.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8795'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799'}] | {'cwe_ids': ['CWE-377', 'CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:58:51Z', 'nvd_published_at': '2021-04-27T20:15:00Z'} |
1.4.0 | GHSA-g8r4-p96j-xfxc | 2022-08-11T00:01:25Z | 2021-04-16T19:53:12Z | null | ['CVE-2021-29440'] | Grav's Twig processing allowing dangerous PHP functions by default | ### Impact
Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.
### Patches
The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`).
Futures major versions of Grav may disable this functionality by default.
### Workarounds
Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
### References
- https://portswigger.net/research/server-side-template-injection
- https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.10'}}] | [{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getgrav/grav'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:55:46Z', 'nvd_published_at': '2021-04-13T20:15:00Z'} |
1.4.0 | GHSA-94hh-pjjg-rwmr | 2023-03-17T17:49:50Z | 2021-04-19T14:58:49Z | null | ['CVE-2021-29444'] | Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime | ### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-browser-runtime'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:49Z', 'nvd_published_at': '2021-04-16T22:15:00Z'} |
1.4.0 | GHSA-rj44-gpjc-29r7 | 2021-03-30T20:20:04Z | 2021-04-06T17:22:41Z | null | ['CVE-2021-21412'] | [thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values | ### Impact
Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled)
### Patches
[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0
### Workarounds
By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).
However, if GPG encrypted values are used/required:
1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string
2. Replace/remove them or skip parsing if present...
### References
https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261
### For more information
If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@thi.ng/egf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@thi.ng/egf'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:40:22Z', 'nvd_published_at': '2021-03-30T18:15:00Z'} |
1.4.0 | GHSA-3rh3-wfr4-76mj | 2021-04-30T17:30:42Z | 2021-04-06T17:28:41Z | null | ['CVE-2021-21391'] | Regular expression Denial of Service in multiple packages |
### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 27.0.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-font'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-list'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-media-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-paste-from-office'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:37:46Z', 'nvd_published_at': '2021-04-29T01:15:00Z'} |
1.4.0 | GHSA-rfw2-x9f8-2f6m | 2021-04-28T19:21:42Z | 2021-04-30T17:27:53Z | null | ['CVE-2021-26722'] | Cross-Site Scripting | LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'oncall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/issues/341'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'}, {'type': 'WEB', 'url': 'https://pypi.org/project/oncall/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T19:21:42Z', 'nvd_published_at': '2021-02-05T18:15:00Z'} |
1.4.0 | GHSA-qhx9-7hx7-cp4r | 2023-09-05T14:37:12Z | 2021-04-07T21:05:21Z | null | ['CVE-2020-28473'] | bottle HTTP Request smuggling | The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'bottle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/bottlepy/bottle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:59:20Z', 'nvd_published_at': '2021-01-18T12:15:00Z'} |
1.4.0 | GHSA-cmc7-mfmr-xqrx | 2021-04-06T21:58:49Z | 2021-04-07T21:01:25Z | null | ['CVE-2021-3116'] | Logic error in authentication in proxy.py | before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'proxy.py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116'}, {'type': 'WEB', 'url': 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}, {'type': 'WEB', 'url': 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/proxy-py/PYSEC-2021-46.yaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/proxy.py/2.3.1/#history'}] | {'cwe_ids': ['CWE-287', 'CWE-480'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:58:49Z', 'nvd_published_at': '2021-01-11T05:15:00Z'} |
1.4.0 | GHSA-q74r-4xw3-ppx9 | 2021-04-16T23:15:34Z | 2021-04-19T14:49:48Z | null | ['CVE-2019-25028'] | Stored cross-site scripting in Grid component in Vaadin 7 and 8 | Missing variable sanitization in `Grid` component in `com.vaadin:vaadin-server` versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector.
- https://vaadin.com/security/cve-2019-25028 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-q74r-4xw3-ppx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25028'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11644'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11645'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25028'}] | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:34Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-8f89-2fwj-5v5r | 2021-03-30T16:22:33Z | 2021-04-13T15:41:24Z | null | ['CVE-2020-8125'] | Improper Input Validation in klona | Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'klona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/778414'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:22:33Z', 'nvd_published_at': '2020-02-04T20:15:00Z'} |
1.4.0 | GHSA-2wqp-jmcc-mc77 | 2021-04-16T23:13:14Z | 2021-04-19T14:47:34Z | null | ['CVE-2021-31405'] | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2021-31405 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.6'}, {'fixed': '14.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31405'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/442'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:14Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-5pxj-mhwj-x5gv | 2023-09-11T18:53:26Z | 2021-04-13T15:24:59Z | null | ['CVE-2020-7771'] | Prototype Pollution in asciitable.js | The package asciitable.js before 1.0.3 is vulnerable to Prototype Pollution via the main function.
### PoC
```js
var a = require("asciitable.js");
var b = JSON.parse('{"__proto__":{"test":123}}');
a({},b);
console.log({}.test)
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'asciitable.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/commit/8db8fc5ffa7a2a6e8596709d99b200afb53f40ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/victornpb/asciitable.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799'}] | {'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:32:45Z', 'nvd_published_at': '2021-01-04T12:15:00Z'} |
1.4.0 | GHSA-vm67-7vmg-66vm | 2021-03-31T17:50:32Z | 2021-04-06T17:24:50Z | null | ['CVE-2021-23348'] | Arbitrary Command Injection in portprocesses | ### Impact
An Arbitrary Command Injection vulnerability was reported in `portprocesses` impacting versions <= 1.0.4.
### Example (Proof of Concept)
The following example demonstrates the vulnerability and will run `touch success` therefore creating a file named `success`.
```js
const portprocesses = require("portprocesses");
portprocesses.killProcess("$(touch success)");
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'portprocesses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23348'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:50:32Z', 'nvd_published_at': '2021-03-31T15:15:00Z'} |