schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-prmc-5v5w-c465
2021-03-31T18:09:39Z
2021-04-06T17:32:38Z
null
[]
Client TLS credentials sent raw to server in npm package nats
Nats is a Node.js client for the NATS messaging system. ## Problem Description _Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication **is NOT affected**. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. ## Affected versions ### Security impact * NPM package nats.js: + **mainline is unaffected** + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 ### Logic flaw * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 ## Impact For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked. ## Workaround *None* ## Solution Upgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-208'}}]
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.js/security/advisories/GHSA-prmc-5v5w-c465'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26149.txt'}]
{'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:09:39Z', 'nvd_published_at': None}
1.4.0
GHSA-6qpr-9mc5-7gch
2023-09-07T18:43:43Z
2021-04-12T19:50:20Z
null
['CVE-2020-28490']
Command Injection in async-git
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: `git.reset('atouch HACKEDb')`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:57:13Z', 'nvd_published_at': '2021-02-18T15:15:00Z'}
1.4.0
GHSA-88rc-3p98-rgvx
2021-04-12T22:33:13Z
2021-04-13T15:13:48Z
null
[]
After order payment process manipulation in shopware/platform and shopware/core
### Impact After order payment process manipulation ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}]
{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:13Z', 'nvd_published_at': None}
1.4.0
GHSA-vf26-7gjf-f92r
2021-04-08T20:03:52Z
2021-04-13T15:23:29Z
null
['CVE-2019-10796']
OS Command Injection in rpi
rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rpi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}, {'type': 'WEB', 'url': 'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:03:52Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}
1.4.0
GHSA-6757-jp84-gxfx
2022-07-29T18:40:16Z
2021-04-20T16:14:24Z
null
['CVE-2020-1747']
Improper Input Validation in PyYAML
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.full_load', 'yaml.FullLoader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/386'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/5080ba513377b6355a0502104846ee804656f1e0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:29:00Z', 'nvd_published_at': '2020-03-24T15:15:00Z'}
1.4.0
GHSA-fvrf-9428-527m
2021-04-30T20:20:59Z
2021-04-22T16:11:01Z
null
['CVE-2021-21427']
Backport for CVE-2021-21024 Blind SQLi from Magento 2
### Impact This vulnerability allows an administrator unauthorized access to restricted resources. We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html. ### Patches _Has the problem been patched? What versions should users upgrade to?_ > v20.0.9 v19.4.13
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21427'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:06:43Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}
1.4.0
GHSA-j2h6-73x8-22c4
2023-08-31T20:44:29Z
2021-04-20T16:43:53Z
null
['CVE-2020-1746']
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the `bind_pw` in the parameters field. The highest threat from this vulnerability is data confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866/commits/0ff609f1bc5e391fa25710b9a0baaf669f347eb1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:47:04Z', 'nvd_published_at': '2020-05-12T18:15:00Z'}
1.4.0
GHSA-6q4w-3wp4-q5wf
2022-05-03T02:57:48Z
2021-04-13T15:15:57Z
null
['CVE-2021-27191']
Denial of Service in get-ip-range
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'get-ip-range'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'}, {'type': 'WEB', 'url': 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210319-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/get-ip-range'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:50:19Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-gwp7-vqr5-h33h
2023-08-07T13:01:27Z
2021-04-20T16:13:45Z
null
['CVE-2020-35678']
Open Redirect in autobahn
Autobahn|Python before 20.12.3 allows redirect header injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/pull/1439'}, {'type': 'WEB', 'url': 'https://autobahn.readthedocs.io/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbario/autobahn-python'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/autobahn/20.12.3/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:27:56Z', 'nvd_published_at': '2020-12-27T00:15:00Z'}
1.4.0
GHSA-rhh9-cm65-3w54
2021-10-05T16:27:33Z
2021-04-30T17:29:30Z
null
['CVE-2018-11765']
Improper Authentication in Apache Hadoop
In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha2'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201016-0005/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:56:41Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-rjmf-p882-645m
2021-04-12T18:51:10Z
2021-04-12T18:51:17Z
null
['CVE-2021-20327']
Improper Certificate Validation
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongodb-client-encryption'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1660'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:00:28Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}
1.4.0
GHSA-q348-f93x-9gx4
2021-04-28T22:29:16Z
2021-04-29T21:53:06Z
null
['CVE-2021-30492']
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain
### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendesk/zendesk_api_client_php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/pull/466'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}]
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T22:29:16Z', 'nvd_published_at': None}
1.4.0
GHSA-hxmg-hm46-cf62
2023-09-12T19:23:11Z
2021-04-13T15:41:01Z
null
['CVE-2020-24391']
Remote code execution in mongo-express
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}, {'type': 'WEB', 'url': 'https://github.com/mongodb-js/query-parser/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:14:37Z', 'nvd_published_at': '2021-03-30T21:15:00Z'}
1.4.0
GHSA-22cm-3qf2-2wc7
2021-04-01T23:39:38Z
2021-04-13T15:30:27Z
null
['CVE-2021-23335']
LDAP Injection in is-user-valid
All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-user-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766'}]
{'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:39:38Z', 'nvd_published_at': '2021-02-11T12:15:00Z'}
1.4.0
GHSA-hxp5-8pgq-mgv9
2021-04-21T20:27:19Z
2021-04-22T16:14:14Z
null
['CVE-2020-13955']
Missing Authentication for Critical Function in Apache Calcite
"HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-splunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CALCITE-4298'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:27:19Z', 'nvd_published_at': '2020-10-09T13:15:00Z'}
1.4.0
GHSA-2c8c-84w2-j38j
2021-04-07T19:33:49Z
2021-04-07T21:14:00Z
null
['CVE-2020-28736']
Improper Restriction of XML External Entity Reference in Plone
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:33:49Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}
1.4.0
GHSA-frpw-jrwx-hcfv
2023-09-07T22:38:20Z
2021-04-13T15:30:00Z
null
['CVE-2021-25864']
Path Traversal in node-red-contrib-huemagic
node-red-contrib-huemagic 3.0.0 is affected by `hue/assets/..%2F` Directory Traversal.in the `res.sendFile` API, used in file hue-magic.js, to fetch an arbitrary file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-red-contrib-huemagic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864'}, {'type': 'WEB', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}, {'type': 'PACKAGE', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:24:50Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}
1.4.0
GHSA-9mrv-456v-pf22
2021-03-22T23:06:41Z
2021-04-13T15:19:50Z
null
['CVE-2020-28487']
Cross-site Scripting in vis-timeline
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'vis-timeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28487'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/issues/838'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/pull/840'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:06:41Z', 'nvd_published_at': '2021-01-22T18:15:00Z'}
1.4.0
GHSA-4mg9-vhxq-vm7j
2021-11-18T19:46:31Z
2021-04-29T21:52:53Z
null
[]
SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database
### Impact Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability. ### Patches This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0. ### Workarounds You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T20:17:07Z', 'nvd_published_at': None}
1.4.0
GHSA-prv2-xwr7-hr57
2021-04-08T20:19:06Z
2021-04-13T15:23:21Z
null
['CVE-2019-10798']
Uncontrolled Resource Consumption in rdf-graph-array
rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rdf-graph-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0-rc6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}, {'type': 'WEB', 'url': 'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:19:06Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}
1.4.0
GHSA-m429-fhmv-c6q2
2023-08-31T21:46:29Z
2021-04-20T16:44:07Z
null
['CVE-2020-14365']
Improper Verification of Cryptographic Signature in ansible
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14365'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1869154'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:49:57Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}
1.4.0
GHSA-j6qj-j888-vvgq
2022-04-22T15:49:55Z
2021-04-06T17:32:00Z
null
['CVE-2021-28163']
Directory exposure in jetty
### Impact If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download. For example, the problem manifests in the following `${jetty.base}`: ```$ tree demo-base/ demo-base/ ├── etc ├── lib ├── resources ├── start.d ├── deploy │   └── async-rest.war └── webapps -> deploy ``` ### Workarounds Do not use a symlink
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.32'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-200', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:13:08Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}
1.4.0
GHSA-5chj-xprr-7qqx
2022-01-04T19:33:28Z
2021-04-22T16:15:33Z
null
['CVE-2020-9447']
Cross-site Scripting in GwtUpload
The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.gwtupload:gwtupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447'}, {'type': 'WEB', 'url': 'https://github.com/manolo/gwtupload/issues/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/manolo/gwtupload'}, {'type': 'WEB', 'url': 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:17:42Z', 'nvd_published_at': '2020-02-28T16:15:00Z'}
1.4.0
GHSA-6hgr-2g6q-3rmc
2021-10-08T21:22:21Z
2021-04-22T16:11:26Z
null
[]
Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19
`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out. - https://vaadin.com/security/cve-2021-31408
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/commit/815b967fc84fefa8d3a4d72b9a036f48b0d96326'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:31:17Z', 'nvd_published_at': None}
1.4.0
GHSA-hj5v-574p-mj7c
2023-08-07T13:05:28Z
2021-04-20T16:39:57Z
null
['CVE-2020-29651']
py vulnerable to Regular Expression Denial of Service
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytest-dev/py'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:17:48Z', 'nvd_published_at': '2020-12-09T07:15:00Z'}
1.4.0
GHSA-69q2-p9xp-739v
2022-03-22T22:08:40Z
2021-04-20T16:32:08Z
null
['CVE-2020-29128']
XML Injection in petl
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'petl'}, 'ecosystem_specific': {'affected_functions': ['petl.io.xml.XmlView']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/issues/526'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/commit/07420ef8463cc387aea84e2d6241cf556574e2a5'}, {'type': 'WEB', 'url': 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/petl-developers/petl'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8'}, {'type': 'WEB', 'url': 'https://petl.readthedocs.io/en/stable/changes.html'}]
{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:20:39Z', 'nvd_published_at': '2020-11-26T05:15:00Z'}
1.4.0
GHSA-vf4w-fg7r-5v94
2021-04-23T00:22:49Z
2021-04-07T20:56:55Z
null
['CVE-2021-30130']
Improper Certificate Validation in phpseclib
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/pull/1635'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00025.html'}]
{'cwe_ids': ['CWE-295', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T17:29:49Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}
1.4.0
GHSA-g78f-549w-c354
2021-04-07T23:21:37Z
2021-04-13T15:23:59Z
null
['CVE-2020-28448']
Prototype Pollution in multi-ini
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/pull/37'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:21:37Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}
1.4.0
GHSA-w9fg-xffh-p362
2021-08-31T21:08:01Z
2021-04-13T15:12:51Z
null
['CVE-2021-21394']
Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches The issue is fixed by #9321. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Using email as third-party identifiers be disabled by not configuring the `email` setting. 2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured. 3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy: * `^/_matrix/client/(r0|unstable)/register/email` * `^/_matrix/client/(r0|unstable)/register/msisdn` * `^/_matrix/client/(r0|unstable)/account/password` * `^/_matrix/client/(r0|unstable)/account/3pid`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:01:40Z', 'nvd_published_at': '2021-04-12T21:15:00Z'}
1.4.0
GHSA-7359-3c6r-hfc2
2023-01-24T14:59:50Z
2021-04-22T16:22:15Z
null
['CVE-2016-11086']
Improper Certificate Validation in oauth ruby gem
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauth-xx/oauth-ruby'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/oauth'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:23:58Z', 'nvd_published_at': '2020-09-24T20:15:00Z'}
1.4.0
GHSA-jgpv-4h4c-xhw3
2021-04-22T17:01:01Z
2021-04-23T16:54:36Z
null
[]
Uncontrolled Resource Consumption in pillow
### Impact _Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._ ### Patches _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### Workarounds _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### References https://nvd.nist.gov/vuln/detail/CVE-2021-27921 ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.1.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:01:01Z', 'nvd_published_at': None}
1.4.0
GHSA-p48w-vf3c-rqjx
2021-04-27T19:43:14Z
2021-04-29T21:51:21Z
null
['CVE-2021-21365']
Cross-Site Scripting in Bootstrap Package
### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` * `Resources/Private/Partials/ContentElements/Header/SubHeader.html` Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). ### Solution Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365'}, {'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:43:14Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}
1.4.0
GHSA-fjq3-5pxw-4wj4
2023-09-07T15:55:33Z
2021-04-07T21:06:30Z
null
['CVE-2020-7965']
Cross-Site Request Forgery in Webargs
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.b1'}, {'fixed': '6.0.0b4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7965'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/commit/b9ee8b0aa668207a363d9fd21d967eeadb975c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#b4-2020-01-28'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#id11'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:19:18Z', 'nvd_published_at': '2020-01-29T15:15:00Z'}
1.4.0
GHSA-jrh7-mhhx-6h88
2021-08-31T21:07:44Z
2021-04-13T15:12:40Z
null
['CVE-2021-21393']
Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints
### Impact Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields. ### Patches This issue is fixed by #9321 and #9393. ### Workarounds The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default. ### Other information Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:48:55Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}
1.4.0
GHSA-c6p9-24rc-jr5h
2021-04-21T19:02:43Z
2021-04-22T16:15:15Z
null
['CVE-2020-7744']
Remote Code Execution and download tracking in Mintegral SDK
"This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background)."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mintegral.msdk:alphab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.6.01'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7744'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/remote-code-execution-rce-sourmint/'}, {'type': 'WEB', 'url': 'https://snyk.io/research/sour-mint-malicious-sdk/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:02:43Z', 'nvd_published_at': '2020-10-15T13:15:00Z'}
1.4.0
GHSA-ffw3-6mp6-jmvj
2023-08-30T22:07:40Z
2021-04-07T21:05:57Z
null
['CVE-2021-26559']
Improper Access Control in Apache Airflow
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/1'}]
{'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:27:01Z', 'nvd_published_at': '2021-02-17T15:15:00Z'}
1.4.0
GHSA-rjww-2x8v-m9v9
2022-09-21T19:31:15Z
2021-04-19T14:52:14Z
null
['CVE-2020-36319']
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8016'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8051'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:31Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-v7ff-8wcx-gmc5
2022-04-17T16:45:25Z
2021-04-06T17:31:01Z
null
['CVE-2021-28164']
Authorization Before Parsing and Canonicalization in jetty
Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.39'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html'}]
{'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:28:10Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}
1.4.0
GHSA-cccf-7xw3-p2vr
2022-02-11T21:12:25Z
2021-04-30T17:28:33Z
null
['CVE-2020-10719']
HTTP Request Smuggling in Undertow
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:37:37Z', 'nvd_published_at': '2020-05-26T16:15:00Z'}
1.4.0
GHSA-xwg3-qrcg-w9x6
2021-04-23T17:17:16Z
2021-04-19T14:51:25Z
null
['CVE-2021-31404']
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. - https://vaadin.com/security/cve-2021-31404
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9875'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:19Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-35q2-47q7-3pc3
2022-08-11T00:21:37Z
2021-04-27T15:56:03Z
null
['CVE-2021-29469']
Node-Redis potential exponential regex in monitor mode
### Impact When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. ### Patches The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`. ### References #1569 (GHSL-2021-026)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0010/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T18:11:39Z', 'nvd_published_at': '2021-04-23T18:15:00Z'}
1.4.0
GHSA-gwrp-pvrq-jmwv
2022-02-08T21:31:42Z
2021-04-26T16:04:00Z
null
['CVE-2021-29425']
Path Traversal and Improper Input Validation in Apache Commons IO
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-io:commons-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/IO-556'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T15:21:31Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}
1.4.0
GHSA-52qp-jpq7-6c54
2021-04-27T20:54:56Z
2021-04-29T21:52:30Z
null
['CVE-2021-29476']
Insecure Deserialization of untrusted data in rmccue/requests
### Impact Unserialization of untrusted data. ### Patches The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. ### References Publications about the vulnerability: * https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress * https://github.com/ambionics/phpggc/issues/52 * https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ * https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf * https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf * https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf * https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f Originally fixed in WordPress 5.5.2: * https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 * https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ Related Security Advisories: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 * https://nvd.nist.gov/vuln/detail/CVE-2020-28032 Notification to the Requests repo including a fix in: * https://github.com/rmccue/Requests/pull/421 and * https://github.com/rmccue/Requests/pull/422 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Request](https://github.com/WordPress/Requests/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'rmccue/requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/rmccue/Requests/pull/421'}, {'type': 'WEB', 'url': 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}, {'type': 'WEB', 'url': 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/'}, {'type': 'WEB', 'url': 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf'}, {'type': 'WEB', 'url': 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml'}, {'type': 'WEB', 'url': 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf'}, {'type': 'WEB', 'url': 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f'}, {'type': 'WEB', 'url': 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:54:56Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}
1.4.0
GHSA-4c7m-wxvm-r7gc
2022-04-01T20:21:55Z
2021-04-14T15:03:16Z
null
['CVE-2021-28918']
Improper parsing of octal bytes in netmask
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. :exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pch5-whg9-qr2r'}, {'type': 'PACKAGE', 'url': 'https://github.com/rs/node-netmask/'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021'}, {'type': 'WEB', 'url': 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md'}, {'type': 'WEB', 'url': 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0010/'}, {'type': 'WEB', 'url': 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:13:23Z', 'nvd_published_at': '2021-04-01T13:15:00Z'}
1.4.0
GHSA-whq6-mj2r-mjqc
2021-03-29T22:11:57Z
2021-04-13T15:17:53Z
null
['CVE-2019-10783']
OS Command Injection in lsof
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lsof'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LSOF-543632'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:57Z', 'nvd_published_at': '2020-01-29T22:15:00Z'}
1.4.0
GHSA-hh8v-jmh3-9437
2021-04-06T21:51:28Z
2021-04-13T15:25:33Z
null
['CVE-2020-8823']
Cross-site scripting in SocksJS-node
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}, {'type': 'WEB', 'url': 'https://www.sockjs.org'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:51:28Z', 'nvd_published_at': '2020-02-10T03:15:00Z'}
1.4.0
GHSA-5wrh-4jwv-5w78
2021-08-31T21:07:35Z
2021-04-13T15:13:08Z
null
['CVE-2021-21392']
Open redirect via transitional IPv6 addresses on dual-stack networks
### Impact Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks. ### Patches This issue is fixed by #9240. ### Workarounds Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems: * `::ffff/80` * `::0000/80` (note that this IP range is considered deprecated by the IETF) * `2002::/16` (note that this IP range is considered deprecated by the IETF) ### References * [RFC3056](https://tools.ietf.org/html/rfc3056) * [RFC4291](https://tools.ietf.org/html/rfc4291)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21392'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9240'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:51:49Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}
1.4.0
GHSA-rp4x-wxqv-cf9m
2021-04-16T23:17:25Z
2021-04-19T14:52:29Z
null
['CVE-2019-25027']
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. - https://vaadin.com/security/cve-2019-25027
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/5498'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}]
{'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-g4cp-h53p-v3v8
2022-02-11T21:12:32Z
2021-04-30T17:28:42Z
null
['CVE-2020-10705']
Allocation of Resources Without Limits or Throttling in Undertow
A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1803241'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:36:15Z', 'nvd_published_at': '2020-06-10T20:15:00Z'}
1.4.0
GHSA-gfr2-qpxh-qj9m
2022-05-05T21:55:25Z
2021-04-07T20:35:24Z
null
['CVE-2020-1735']
Path Traversal in Ansible
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67793'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:54:51Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}
1.4.0
GHSA-pxcc-hj8w-fmm7
2021-03-31T18:00:32Z
2021-04-06T17:25:12Z
null
['CVE-2021-21414']
Command injection vulnerability in @prisma/sdk in getPackedPackage function
### Impact As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase. ### Patches Fixed in - @prisma/sdk@2.20.0 (latest channel) - @prisma/sdk@2.20.0-dev.29 (dev channel) Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245) ### Acknowledgements This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). ### For more information If you have any questions or comments about this advisory: - Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions) - Email us at security@prisma.io
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@prisma/sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414'}, {'type': 'WEB', 'url': 'https://github.com/prisma/prisma/pull/6245'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0003/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:00:32Z', 'nvd_published_at': '2021-04-29T01:15:00Z'}
1.4.0
GHSA-wmg4-8cp2-hpg9
2022-08-11T13:18:23Z
2021-04-19T14:54:04Z
null
['CVE-2021-29430']
Sydent vulnerable to denial of service attack via memory exhaustion
### Impact Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients. ### Patches Patched by 89071a1, 0523511, f56eee3. ### Workarounds Request sizes can be limited in an HTTP reverse-proxy. There are no known workarounds for the problem with overlarge responses. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]
{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:49:34Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}
1.4.0
GHSA-qgp4-5qx6-548g
2021-04-27T20:11:58Z
2021-04-30T17:30:06Z
null
['CVE-2021-29460']
Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby
### Impact An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. Visitors without Panel access can only use this attack vector if your site allows SVG or XML file uploads in frontend forms and you don't already validate or sanitize uploaded SVG or XML files. The attack requires user interaction by another user or visitor and *cannot* be automated. ### Patches #### Uploads in the Panel The problem has been patched in [Kirby 3.5.4](https://github.com/getkirby/kirby/releases/tag/3.5.4) by validating uploaded SVG and XML files and rejecting potentially harmful files. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. #### Frontend upload forms Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to Kirby 3.5.4+. #### Validate existing files Already uploaded files are *not* automatically validated again. If you are not sure if you have been impacted by this vulnerability in the past, we recommend to run all site files through the validator classes after updating to Kirby 3.5.4. You can use the following test script by pasting it into a template or uploading it to your web root: ```php <?php @include_once __DIR__ . '/kirby/bootstrap.php'; if (version_compare(kirby()->version(), '3.5.4', '<') === true) { die('This script requires Kirby 3.5.4+.'); } $objects = [ // the site itself site(), // all pages and drafts ...site()->index(true)->values(), // all users ...kirby()->users()->values() ]; $errors = false; foreach ($objects as $object) { foreach ($object->files() as $file) { try { // validate the contents lazily // (if a validator exists) $file->validateContents(true); } catch (\Kirby\Exception\InvalidArgumentException $e) { echo $file->id() . ': ' . $e->getMessage() . "<br>\n"; $errors = true; } } } if ($errors === false) { echo 'No validation errors found.'; } ``` You only need to run this validator script once as future uploads will automatically be validated. If the script prints "No validation errors found", you have not been impacted by the vulnerability so far. Errors that it lists may or may not be critical as our validator classes also catch files with an invalid data structure or less harmful attacks like the ["billion laughs" denial-of-service attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) or the usage of external sources. We recommend to review and fix each listed error manually until the script no longer finds any validation errors. **Please delete the script again after you have used it.** ### Workarounds If you cannot update to Kirby 3.5.4, you can disable the upload of SVG and XML files in your [file blueprints](https://getkirby.com/docs/reference/panel/blueprints/file#accept) and validate or replace your already uploaded files once. ### Credits Thanks to @sreenathr10 for reporting the problem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29460'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.4'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:11:58Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}
1.4.0
GHSA-82mf-mmh7-hxp5
2021-10-08T21:23:58Z
2021-04-19T14:48:15Z
null
[]
Directory traversal in development mode handler in Vaadin 14 and 15-17
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. - https://vaadin.com/security/cve-2020-36321
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:32Z', 'nvd_published_at': None}
1.4.0
GHSA-qgcg-p3v2-9h4p
2021-04-27T21:33:12Z
2021-04-30T17:29:42Z
null
['CVE-2020-5412']
Externally Controlled Reference to a Resource in Another Sphere and Confused Deputy in Spring Cloud Netflix
Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5412'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5412'}]
{'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:33:12Z', 'nvd_published_at': '2020-08-07T21:15:00Z'}
1.4.0
GHSA-jqj4-r483-4gvr
2021-10-08T21:23:23Z
2021-04-19T14:48:51Z
null
[]
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. - https://vaadin.com/security/cve-2019-25027
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '13.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}]
{'cwe_ids': ['CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:38Z', 'nvd_published_at': None}
1.4.0
GHSA-2548-q746-x5x6
2021-03-22T20:46:47Z
2021-04-13T15:20:49Z
null
['CVE-2021-23359']
Code injection in port-killer
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'port-killer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23359'}, {'type': 'WEB', 'url': 'https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533'}]
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:46:47Z', 'nvd_published_at': '2021-03-18T13:15:00Z'}
1.4.0
GHSA-qwwg-gc55-qqrv
2021-04-13T15:54:30Z
2021-04-13T15:54:40Z
null
['CVE-2020-17131']
Out-of-bounds Write in Chakra
Chakra Scripting Engine Memory Corruption Vulnerability
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17131'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6531'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:08:14Z', 'nvd_published_at': '2020-12-10T00:15:00Z'}
1.4.0
GHSA-3h5r-928v-mxhh
2021-10-08T21:22:53Z
2021-04-19T14:49:13Z
null
[]
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}]
{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:45Z', 'nvd_published_at': None}
1.4.0
GHSA-h5h8-pc6h-jvvx
2022-08-11T00:19:18Z
2021-04-29T21:52:04Z
null
['CVE-2021-29472']
Composer's missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial
URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system. ### Impact - The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. - The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote command injection. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. - Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately ### Patches 1.10.22 and 2.0.13 include patches for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/php-supply-chain-attack-on-composer/'}, {'type': 'WEB', 'url': 'https://getcomposer.org/'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4907'}]
{'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:33:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}
1.4.0
GHSA-2pwh-52h7-7j84
2021-04-13T17:35:23Z
2021-04-16T19:52:49Z
null
[]
JavaScript execution via malicious molfiles (XSS)
### Impact The viewer plugin implementation of `<mol:molecule>` renders molfile data directly inside a `<script>` tag without any escaping. Arbitrary JavaScript code can thus be executed in the client browser via crafted molfiles. ### Patches Patched in v0.3.0: Molfile data is now rendered as value of a hidden `<input>` tag and escaped via JSF's mechanisms. ### Workarounds No workaround available.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'de.ipb-halle:molecularfaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:35:23Z', 'nvd_published_at': None}
1.4.0
GHSA-gcm9-cc3r-c6vj
2021-03-29T22:10:04Z
2021-04-13T15:18:09Z
null
['CVE-2020-27224']
Cross-site Scripting (XSS) in Eclipse Theia
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@theia/preview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/7954'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7971'}, {'type': 'WEB', 'url': 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:10:04Z', 'nvd_published_at': '2021-02-24T17:15:00Z'}
1.4.0
GHSA-gwr8-5j83-483c
2022-04-26T17:59:52Z
2021-04-20T16:44:22Z
null
['CVE-2019-14904']
OS Command Injection and Improper Input Validation in ansible
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14904'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/65686'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T13:24:57Z', 'nvd_published_at': '2020-08-26T03:15:00Z'}
1.4.0
GHSA-rhwf-hqpr-q8g2
2021-04-07T19:36:21Z
2021-04-13T15:24:38Z
null
['CVE-2020-8129']
Code Injection in script-manager
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'script-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8129'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660563'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:36:21Z', 'nvd_published_at': '2020-02-14T22:15:00Z'}
1.4.0
GHSA-mh74-4m5g-fcjx
2022-08-11T13:17:50Z
2021-04-19T14:54:24Z
null
['CVE-2021-29432']
Malicious users could abuse Sydent to control the content of invitation emails
### Impact A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. ### Patches Fixed in 4469d1d, 6b405a8, 65a6e91. Note that these patches include changes to the *default* email templates. If these templates have been locally modified, they must also be updated. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29432'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:47:15Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}
1.4.0
GHSA-63rq-p8fp-524q
2021-04-12T18:44:12Z
2021-04-13T15:12:06Z
null
[]
Potential API key leak
If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel. This is patched in v1.2.4
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'sopel-modules.weather'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:44:12Z', 'nvd_published_at': None}
1.4.0
GHSA-xrx6-fmxq-rjj2
2023-02-13T17:27:22Z
2021-04-30T17:35:15Z
null
['CVE-2020-25658']
Timing attacks in python-rsa
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25658'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/165'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:5634'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:0637'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:1716'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2020-25658'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1889972'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658'}, {'type': 'PACKAGE', 'url': 'https://github.com/sybrenstuvel/python-rsa'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/'}]
{'cwe_ids': ['CWE-327', 'CWE-385'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:11:41Z', 'nvd_published_at': '2020-11-12T14:15:00Z'}
1.4.0
GHSA-53xj-v576-3ch2
2022-06-17T20:44:20Z
2021-04-13T15:22:09Z
null
['CVE-2019-10802']
OS Command Injection in giting
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument `repo` of function `pull()` is executed by the package without any validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'giting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}, {'type': 'PACKAGE', 'url': 'https://github.com/MangoRaft/git'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITING-559008'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208120654/https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:50:02Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}
1.4.0
GHSA-42j4-733x-5vcf
2021-04-16T23:15:27Z
2021-04-19T14:49:32Z
null
['CVE-2020-36320']
Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7
Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2020-36320
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.22'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/issues/7757'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12104'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36320'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:27Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-ccgm-3xw4-h5p8
2021-04-19T21:54:20Z
2021-04-20T16:30:03Z
null
['CVE-2021-29421']
Improper Restriction of XML External Entity Reference in pikepdf
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pikepdf'}, 'ecosystem_specific': {'affected_functions': ['pikepdf.models.metadata.XMLParser', 'pikepdf.models.metadata.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421'}, {'type': 'WEB', 'url': 'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36P4HTLBJPO524WMQWW57N3QRF4RFSJG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:54:20Z', 'nvd_published_at': '2021-04-01T20:15:00Z'}
1.4.0
GHSA-j9wr-49vq-rm5g
2021-10-08T21:24:54Z
2021-04-19T14:46:49Z
null
[]
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. - https://vaadin.com/security/cve-2021-31407
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '14.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0.1'}]}], 'versions': ['19.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-j9wr-49vq-rm5g'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}]
{'cwe_ids': ['CWE-402'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:45Z', 'nvd_published_at': None}
1.4.0
GHSA-86hp-cj9j-33vv
2021-08-30T23:28:52Z
2021-04-07T20:33:26Z
null
['CVE-2020-1753']
Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1753'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/kubernetes/pull/51'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-collections/kubernetes'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:15:45Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-2fw4-mgq9-39cx
2021-04-21T21:15:38Z
2021-04-22T15:53:45Z
null
['CVE-2017-18924']
Code Injection in oauth2-server
"oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'"
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'oauth2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/pull/452'}, {'type': 'WEB', 'url': 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc7636'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:15:38Z', 'nvd_published_at': '2020-10-04T05:15:00Z'}
1.4.0
GHSA-mr8h-j9cv-4m8h
2021-04-22T14:30:10Z
2021-04-22T16:11:17Z
null
['CVE-2021-31408']
Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19
`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out. - https://vaadin.com/security/cve-2021-31408
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '19.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31408'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}]
{'cwe_ids': ['CWE-287', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:30:10Z', 'nvd_published_at': '2021-04-23T17:15:00Z'}
1.4.0
GHSA-9h6g-6mxg-vvp4
2021-10-08T21:24:35Z
2021-04-19T14:47:18Z
null
[]
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadin.com/security/cve-2021-31406
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0.1'}]}], 'versions': ['19.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}]
{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:06Z', 'nvd_published_at': None}
1.4.0
GHSA-77pw-c3j2-5fc8
2023-08-31T15:48:04Z
2021-04-30T17:34:03Z
null
['CVE-2020-13952']
Plaintext password leak in Apache Superset
In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.37.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13952'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:18:16Z', 'nvd_published_at': '2020-09-30T21:15:00Z'}
1.4.0
GHSA-49r2-73m6-pp8f
2021-04-23T17:13:44Z
2021-04-19T14:51:58Z
null
['CVE-2020-36321']
Directory traversal in development mode handler in Vaadin 14 and 15-17
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. - https://vaadin.com/security/cve-2020-36321
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9392'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}]
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-fc42-h7q4-qp8h
2021-03-22T18:24:32Z
2021-04-13T15:16:20Z
null
['CVE-2021-23360']
Command Injection in killport
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'killport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:24:32Z', 'nvd_published_at': '2021-03-21T16:15:00Z'}
1.4.0
GHSA-vgv5-cxvh-vfxh
2022-11-08T18:16:44Z
2021-04-07T20:50:57Z
null
['CVE-2020-26759']
Arbitrary code execution in clickhouse-driver
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'clickhouse-driver'}, 'ecosystem_specific': {'affected_functions': ['clickhouse_driver.bufferedreader.BufferedReader', 'clickhouse_driver.bufferedreader.BufferedReader.read', 'clickhouse_driver.bufferedreader.BufferedReader.read_strings', 'clickhouse_driver.bufferedwriter.BufferedWriter', 'clickhouse_driver.bufferedwriter.BufferedWriter.__init__', 'clickhouse_driver.bufferedwriter.BufferedWriter.write']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26759'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/d708ed548e1d6f254ba81a21de8ba543a53b5598'}, {'type': 'PACKAGE', 'url': 'https://github.com/mymarilyn/clickhouse-driver'}]
{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:25:07Z', 'nvd_published_at': '2021-01-06T13:15:00Z'}
1.4.0
GHSA-2f6g-w5gj-c93h
2021-03-22T23:02:01Z
2021-04-13T15:20:09Z
null
['CVE-2021-23328']
Prototype Pollution in iniparserjs
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'iniparserjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23328'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/iniparserjs'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:02:01Z', 'nvd_published_at': '2021-01-29T17:15:00Z'}
1.4.0
GHSA-hhx9-p69v-cx2j
2023-09-20T18:19:48Z
2021-04-30T17:34:13Z
null
['CVE-2020-13927']
Authentication bypass in Apache Airflow
"The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default"
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'}, {'type': 'WEB', 'url': 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/1.10.11'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:30:46Z', 'nvd_published_at': '2020-11-10T16:15:00Z'}
1.4.0
GHSA-hmv2-79q8-fv6g
2021-04-22T22:04:31Z
2021-04-30T17:31:43Z
null
['CVE-2020-7212']
Uncontrolled Resource Consumption in urllib3
The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.2'}, {'fixed': '1.25.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.25.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7212'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.25.8/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:04:31Z', 'nvd_published_at': '2020-03-06T20:15:00Z'}
1.4.0
GHSA-86vp-x3pr-79rx
2022-08-11T16:58:14Z
2021-04-20T16:40:14Z
null
['CVE-2020-17515']
Apache Airflow Cross-site scripting due to incomplete fix for CVE-2020-13944
The `origin` parameter passed to some of the endpoints like `/trigger` was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17515'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/14738'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/1.10.15'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/2.0.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pypi.org/project/apache-airflow'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/11/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/01/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T23:23:06Z', 'nvd_published_at': '2020-12-11T14:15:00Z'}
1.4.0
GHSA-3p3h-qghp-hvh2
2023-08-31T16:36:07Z
2021-04-20T16:30:26Z
null
['CVE-2020-28724']
Open Redirect in werkzeug
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/issues/1639'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/issues/822'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/pull/890/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:51:30Z', 'nvd_published_at': '2020-11-18T15:15:00Z'}
1.4.0
GHSA-jmx8-355m-8vwh
2021-04-16T23:18:28Z
2021-04-19T14:53:09Z
null
['CVE-2018-25007']
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.5'}}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/4774'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}]
{'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:18:28Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-w8h4-vw8f-rvvj
2023-09-12T19:22:22Z
2021-04-13T15:30:09Z
null
['CVE-2021-26276']
Improper Control of Dynamically-Managed Code Resources in config-shield
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. **NOTE:** the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'config-shield'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}, {'type': 'WEB', 'url': 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4773'}, {'type': 'PACKAGE', 'url': 'https://github.com/godaddy/node-config-shield'}]
{'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:44:52Z', 'nvd_published_at': '2021-01-27T20:15:00Z'}
1.4.0
GHSA-79qm-h35f-hr77
2022-01-04T19:48:58Z
2021-04-13T15:23:13Z
null
['CVE-2019-10799']
OS Command Injection in compile-sass
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function &quot;setupCleanupOnExit(cssPath)&quot; within &quot;dist/index.js&quot; is executed as part of the &quot;rm&quot; command without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'compile-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799'}, {'type': 'WEB', 'url': 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/eiskalteschatten/compile-sass'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:21:56Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}
1.4.0
GHSA-vh8f-xw5v-8993
2021-04-12T19:01:01Z
2021-04-12T19:01:20Z
null
['CVE-2020-7786']
Command Injection in macfromip
All versions of npm package macfromip are affected by a command injection vulnerability. The injection point is located in line 66 in macfromip.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'macfromip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/macfromip'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:59:04Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}
1.4.0
GHSA-c43q-5hpj-4crv
2021-04-22T19:22:31Z
2021-04-23T16:55:01Z
null
['CVE-2021-28168']
Local information disclosure via system temporary directory
## Impact Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. ## Workaround This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM. ## Patches Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey. ### References - https://github.com/eclipse-ee4j/jersey/pull/4712 - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ## Similar Vulnerabilities Similar, but not the same: - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 - Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 --- Original Disclosure: > Hello Jersey Security Team, > > Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability. > > You can see the custom CodeQL query utilized here: > https://lgtm.com/query/8831016213790320486/ > > This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user. > > This vulnerability impacts the following locations in this project's source: > > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73 > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208 > > This vulnerability exists because of the vulnerability in the `Utils.createTempFile`: > > https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53 > > This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. > > If there is sensitive information written to these files, it is disclosed to other local users on this system. > > The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:jersey-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.28'}, {'fixed': '2.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:jersey-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/pull/4712'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-668', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T19:22:31Z', 'nvd_published_at': '2021-04-22T18:15:00Z'}
1.4.0
GHSA-8h84-8j4f-p97q
2021-04-07T20:24:23Z
2021-04-13T15:24:21Z
null
['CVE-2019-10792']
Injection in bodymen
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}, {'type': 'WEB', 'url': 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T20:24:23Z', 'nvd_published_at': '2020-02-18T16:15:00Z'}
1.4.0
GHSA-r9vm-rhmf-7hxx
2021-03-29T23:01:10Z
2021-04-13T15:17:06Z
null
['CVE-2019-10787']
OS Command Injection in im-resize
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'im-resize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T23:01:10Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}
1.4.0
GHSA-rpw6-9xfx-jvcx
2023-07-05T23:20:00Z
2021-04-22T16:20:36Z
null
['CVE-2020-36193']
Directory Traversal in Archive_Tar
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. ### :exclamation: Note: There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36193'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-36193.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4894'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-001'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:56:54Z', 'nvd_published_at': '2021-01-18T20:15:00Z'}
1.4.0
GHSA-9w8r-397f-prfh
2023-08-07T11:25:58Z
2021-04-20T16:35:47Z
null
['CVE-2021-20270']
Infinite Loop in Pygments
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20270'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/f91804ff4772e3ab41f46e28d370f57898700333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1922136'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4889'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:58:03Z', 'nvd_published_at': '2021-03-23T17:15:00Z'}
1.4.0
GHSA-75c5-f4gw-38r9
2023-07-05T23:21:01Z
2021-04-22T16:20:59Z
null
['CVE-2020-28949']
Multiple vulnerabilities through filename manipulation in Archive_Tar
Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4817'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-013'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:20:31Z', 'nvd_published_at': '2020-11-19T19:15:00Z'}
1.4.0
GHSA-pghf-347x-c2gj
2021-04-14T22:22:37Z
2021-04-16T19:53:28Z
null
['CVE-2021-30459']
SQL Injection via in django-debug-toolbar
### Impact With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form. **NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**. Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue. ### Patches Please upgrade to one of the following versions, depending on the major version you're using: - Version 1.x: [django-debug-toolbar 1.11.1](https://pypi.org/project/django-debug-toolbar/1.11.1/) - Version 2.x: [django-debug-toolbar 2.2.1](https://pypi.org/project/django-debug-toolbar/2.2.1/) - Version 3.x: [django-debug-toolbar 3.2.1](https://pypi.org/project/django-debug-toolbar/3.2.1/) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [django-debug-toolbar repo](https://github.com/jazzband/django-debug-toolbar/issues/new) (Please NO SENSITIVE INFORMATION, send an email instead!) * Email us at [security@jazzband.co](mailto:security@jazzband.co)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-debug-toolbar/releases'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T22:22:37Z', 'nvd_published_at': '2021-04-14T18:15:00Z'}
1.4.0
GHSA-22wc-c9wj-6q2v
2021-04-16T23:11:53Z
2021-04-19T15:12:05Z
null
[]
VVE-2021-0001: Memory corruption using function calls within arrays
### Impact When performing a function call inside an array, there is a memory corruption issue that occurs because of an incorrect pointer to the the tip of the stack. ### Patches This issue was partially fixed in [VVE-2020-0004](https://github.com/vyperlang/vyper/security/advisories/GHSA-2r3x-4mrv-mcxf), however the fix did not update similar code for arrays, which had a similar issue. The issue is fully fixed in https://github.com/vyperlang/vyper/pull/2345
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2345'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/11b7b5b7e59bc9dc859d51cd41a924b59fe47c9e'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper'}]
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:11:53Z', 'nvd_published_at': None}
1.4.0
GHSA-pw4v-gr34-2553
2022-07-22T16:32:37Z
2021-04-16T19:53:37Z
null
['CVE-2021-29433']
Sydent DoS (via resource exhaustion) due to improper input validation
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches Fixed by 3175fd3. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29433'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/sydent'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T18:45:07Z', 'nvd_published_at': '2021-04-15T18:15:00Z'}
1.4.0
GHSA-xw22-wv29-3299
2021-04-02T17:05:21Z
2021-04-06T17:29:52Z
null
['CVE-2021-21421']
ApiKey secret could be revelated on network issue
### Impact _What kind of vulnerability is it? Who is impacted?_ Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too ### Patches _Has the problem been patched? What versions should users upgrade to?_ creharmony/node-etsy-client#18 fixes this issue. This is fixed in [node-etsy-client v0.3.0](https://github.com/creharmony/node-etsy-client/tree/v0.3.0) and later. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not report or log etsy client error if you are using version <= v0.2.0 Update your version of node-etsy-client ### References _Are there any links users can visit to find out more?_ - https://github.com/creharmony/node-etsy-client/issues/17 : On connect error secret appears in error #17 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/creharmony/node-etsy-client/issues](https://github.com/creharmony/node-etsy-client/issues/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-etsy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/security/advisories/GHSA-xw22-wv29-3299'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21421'}, {'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d'}]
{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T17:05:21Z', 'nvd_published_at': '2021-04-01T22:15:00Z'}
1.4.0
GHSA-4hjq-422q-4vpx
2022-08-10T23:35:31Z
2021-04-06T17:20:58Z
null
['CVE-2021-27908']
Mautic vulnerable to secret data exfiltration via symfony parameters
### Impact Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application. For example, 1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <`script> console.log("db password is: %mautic.db_password%"); </script>` 2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: <real password>` Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L ### Patches Upgrade to 3.3.2 ### Workarounds No ### References No ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27908'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-732', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:38:12Z', 'nvd_published_at': '2021-03-23T20:15:00Z'}
1.4.0
GHSA-23c7-6444-399m
2022-10-25T20:51:03Z
2021-04-09T15:42:40Z
null
['CVE-2021-21431']
Improper Input Validation in sopel-plugins.channelmgnt
### Impact On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. ### Patches Upgrade to 2.0.1 or higher ### Workarounds Do not use this plugin on networks where TARGMAX > 1. ### For more information If you have any questions or comments about this advisory: * Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/). * Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sopel-plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}]
{'cwe_ids': ['CWE-20', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T15:42:18Z', 'nvd_published_at': '2021-04-09T16:15:00Z'}