schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-prmc-5v5w-c465 | 2021-03-31T18:09:39Z | 2021-04-06T17:32:38Z | null | [] | Client TLS credentials sent raw to server in npm package nats | Nats is a Node.js client for the NATS messaging system.
## Problem Description
_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.
The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment.
The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.
Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected.
For clarity: NATS account NKey authentication **is NOT affected**.
Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is
present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.
## Affected versions
### Security impact
* NPM package nats.js:
+ **mainline is unaffected**
+ beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
### Logic flaw
* NPM package nats.ws:
+ status: preview
+ flawed from 1.0.0-85, fixed in 1.0.0-111
* Deno repository https://github.com/nats-io/nats.deno
+ status: preview
+ flawed in all git tags prior to fix
+ fixed with git tag v1.0.0-9
## Impact
For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the
server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
## Workaround
*None*
## Solution
Upgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones. | [] | [{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-208'}}] | [{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.js/security/advisories/GHSA-prmc-5v5w-c465'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26149.txt'}] | {'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:09:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qpr-9mc5-7gch | 2023-09-07T18:43:43Z | 2021-04-12T19:50:20Z | null | ['CVE-2020-28490'] | Command Injection in async-git | The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: `git.reset('atouch HACKEDb')` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:57:13Z', 'nvd_published_at': '2021-02-18T15:15:00Z'} |
1.4.0 | GHSA-88rc-3p98-rgvx | 2021-04-12T22:33:13Z | 2021-04-13T15:13:48Z | null | [] | After order payment process manipulation in shopware/platform and shopware/core | ### Impact
After order payment process manipulation
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}] | {'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vf26-7gjf-f92r | 2021-04-08T20:03:52Z | 2021-04-13T15:23:29Z | null | ['CVE-2019-10796'] | OS Command Injection in rpi | rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rpi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}, {'type': 'WEB', 'url': 'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:03:52Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-6757-jp84-gxfx | 2022-07-29T18:40:16Z | 2021-04-20T16:14:24Z | null | ['CVE-2020-1747'] | Improper Input Validation in PyYAML | A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.full_load', 'yaml.FullLoader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/386'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/5080ba513377b6355a0502104846ee804656f1e0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:29:00Z', 'nvd_published_at': '2020-03-24T15:15:00Z'} |
1.4.0 | GHSA-fvrf-9428-527m | 2021-04-30T20:20:59Z | 2021-04-22T16:11:01Z | null | ['CVE-2021-21427'] | Backport for CVE-2021-21024 Blind SQLi from Magento 2 | ### Impact
This vulnerability allows an administrator unauthorized access to restricted resources.
We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
> v20.0.9 v19.4.13 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}] | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21427'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:06:43Z', 'nvd_published_at': '2021-04-21T21:15:00Z'} |
1.4.0 | GHSA-j2h6-73x8-22c4 | 2023-08-31T20:44:29Z | 2021-04-20T16:43:53Z | null | ['CVE-2020-1746'] | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the `bind_pw` in the parameters field. The highest threat from this vulnerability is data confidentiality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866/commits/0ff609f1bc5e391fa25710b9a0baaf669f347eb1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:47:04Z', 'nvd_published_at': '2020-05-12T18:15:00Z'} |
1.4.0 | GHSA-6q4w-3wp4-q5wf | 2022-05-03T02:57:48Z | 2021-04-13T15:15:57Z | null | ['CVE-2021-27191'] | Denial of Service in get-ip-range | The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'get-ip-range'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'}, {'type': 'WEB', 'url': 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210319-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/get-ip-range'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:50:19Z', 'nvd_published_at': '2021-02-11T18:15:00Z'} |
1.4.0 | GHSA-gwp7-vqr5-h33h | 2023-08-07T13:01:27Z | 2021-04-20T16:13:45Z | null | ['CVE-2020-35678'] | Open Redirect in autobahn | Autobahn|Python before 20.12.3 allows redirect header injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/pull/1439'}, {'type': 'WEB', 'url': 'https://autobahn.readthedocs.io/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbario/autobahn-python'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/autobahn/20.12.3/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:27:56Z', 'nvd_published_at': '2020-12-27T00:15:00Z'} |
1.4.0 | GHSA-rhh9-cm65-3w54 | 2021-10-05T16:27:33Z | 2021-04-30T17:29:30Z | null | ['CVE-2018-11765'] | Improper Authentication in Apache Hadoop | In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha2'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201016-0005/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:56:41Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-rjmf-p882-645m | 2021-04-12T18:51:10Z | 2021-04-12T18:51:17Z | null | ['CVE-2021-20327'] | Improper Certificate Validation | A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-client-encryption'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1660'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:00:28Z', 'nvd_published_at': '2021-02-25T17:15:00Z'} |
1.4.0 | GHSA-q348-f93x-9gx4 | 2021-04-28T22:29:16Z | 2021-04-29T21:53:06Z | null | ['CVE-2021-30492'] | Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain | ### Impact
Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).
### Resolution
Validate the provided Zendesk subdomain to be a valid subdomain in:
* getAuthUrl
* getAccessToken | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendesk/zendesk_api_client_php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/pull/466'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}] | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T22:29:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxmg-hm46-cf62 | 2023-09-12T19:23:11Z | 2021-04-13T15:41:01Z | null | ['CVE-2020-24391'] | Remote code execution in mongo-express | mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}, {'type': 'WEB', 'url': 'https://github.com/mongodb-js/query-parser/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:14:37Z', 'nvd_published_at': '2021-03-30T21:15:00Z'} |
1.4.0 | GHSA-22cm-3qf2-2wc7 | 2021-04-01T23:39:38Z | 2021-04-13T15:30:27Z | null | ['CVE-2021-23335'] | LDAP Injection in is-user-valid | All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-user-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766'}] | {'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:39:38Z', 'nvd_published_at': '2021-02-11T12:15:00Z'} |
1.4.0 | GHSA-hxp5-8pgq-mgv9 | 2021-04-21T20:27:19Z | 2021-04-22T16:14:14Z | null | ['CVE-2020-13955'] | Missing Authentication for Critical Function in Apache Calcite | "HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-splunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CALCITE-4298'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:27:19Z', 'nvd_published_at': '2020-10-09T13:15:00Z'} |
1.4.0 | GHSA-2c8c-84w2-j38j | 2021-04-07T19:33:49Z | 2021-04-07T21:14:00Z | null | ['CVE-2020-28736'] | Improper Restriction of XML External Entity Reference in Plone | Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:33:49Z', 'nvd_published_at': '2020-12-30T19:15:00Z'} |
1.4.0 | GHSA-frpw-jrwx-hcfv | 2023-09-07T22:38:20Z | 2021-04-13T15:30:00Z | null | ['CVE-2021-25864'] | Path Traversal in node-red-contrib-huemagic | node-red-contrib-huemagic 3.0.0 is affected by `hue/assets/..%2F` Directory Traversal.in the `res.sendFile` API, used in file hue-magic.js, to fetch an arbitrary file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-red-contrib-huemagic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864'}, {'type': 'WEB', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}, {'type': 'PACKAGE', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:24:50Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-9mrv-456v-pf22 | 2021-03-22T23:06:41Z | 2021-04-13T15:19:50Z | null | ['CVE-2020-28487'] | Cross-site Scripting in vis-timeline | This affects the package vis-timeline before 7.4.4.
An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'vis-timeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28487'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/issues/838'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/pull/840'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:06:41Z', 'nvd_published_at': '2021-01-22T18:15:00Z'} |
1.4.0 | GHSA-4mg9-vhxq-vm7j | 2021-11-18T19:46:31Z | 2021-04-29T21:52:53Z | null | [] | SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database | ### Impact
Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability.
### Patches
This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0.
### Workarounds
You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
| [] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T20:17:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-prv2-xwr7-hr57 | 2021-04-08T20:19:06Z | 2021-04-13T15:23:21Z | null | ['CVE-2019-10798'] | Uncontrolled Resource Consumption in rdf-graph-array | rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rdf-graph-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0-rc6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}, {'type': 'WEB', 'url': 'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:19:06Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-m429-fhmv-c6q2 | 2023-08-31T21:46:29Z | 2021-04-20T16:44:07Z | null | ['CVE-2020-14365'] | Improper Verification of Cryptographic Signature in ansible | A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14365'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1869154'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:49:57Z', 'nvd_published_at': '2020-09-23T13:15:00Z'} |
1.4.0 | GHSA-j6qj-j888-vvgq | 2022-04-22T15:49:55Z | 2021-04-06T17:32:00Z | null | ['CVE-2021-28163'] | Directory exposure in jetty | ### Impact
If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download.
For example, the problem manifests in the following `${jetty.base}`:
```$ tree demo-base/
demo-base/
├── etc
├── lib
├── resources
├── start.d
├── deploy
│ └── async-rest.war
└── webapps -> deploy
```
### Workarounds
Do not use a symlink | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.32'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-200', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:13:08Z', 'nvd_published_at': '2021-04-01T15:15:00Z'} |
1.4.0 | GHSA-5chj-xprr-7qqx | 2022-01-04T19:33:28Z | 2021-04-22T16:15:33Z | null | ['CVE-2020-9447'] | Cross-site Scripting in GwtUpload | The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.gwtupload:gwtupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447'}, {'type': 'WEB', 'url': 'https://github.com/manolo/gwtupload/issues/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/manolo/gwtupload'}, {'type': 'WEB', 'url': 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:17:42Z', 'nvd_published_at': '2020-02-28T16:15:00Z'} |
1.4.0 | GHSA-6hgr-2g6q-3rmc | 2021-10-08T21:22:21Z | 2021-04-22T16:11:26Z | null | [] | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/commit/815b967fc84fefa8d3a4d72b9a036f48b0d96326'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:31:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hj5v-574p-mj7c | 2023-08-07T13:05:28Z | 2021-04-20T16:39:57Z | null | ['CVE-2020-29651'] | py vulnerable to Regular Expression Denial of Service | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytest-dev/py'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:17:48Z', 'nvd_published_at': '2020-12-09T07:15:00Z'} |
1.4.0 | GHSA-69q2-p9xp-739v | 2022-03-22T22:08:40Z | 2021-04-20T16:32:08Z | null | ['CVE-2020-29128'] | XML Injection in petl | petl before 1.68, in some configurations, allows resolution of entities in an XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'petl'}, 'ecosystem_specific': {'affected_functions': ['petl.io.xml.XmlView']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/issues/526'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/commit/07420ef8463cc387aea84e2d6241cf556574e2a5'}, {'type': 'WEB', 'url': 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/petl-developers/petl'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8'}, {'type': 'WEB', 'url': 'https://petl.readthedocs.io/en/stable/changes.html'}] | {'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:20:39Z', 'nvd_published_at': '2020-11-26T05:15:00Z'} |
1.4.0 | GHSA-vf4w-fg7r-5v94 | 2021-04-23T00:22:49Z | 2021-04-07T20:56:55Z | null | ['CVE-2021-30130'] | Improper Certificate Validation in phpseclib | phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/pull/1635'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00025.html'}] | {'cwe_ids': ['CWE-295', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T17:29:49Z', 'nvd_published_at': '2021-04-06T15:15:00Z'} |
1.4.0 | GHSA-g78f-549w-c354 | 2021-04-07T23:21:37Z | 2021-04-13T15:23:59Z | null | ['CVE-2020-28448'] | Prototype Pollution in multi-ini | This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/pull/37'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:21:37Z', 'nvd_published_at': '2020-12-22T13:15:00Z'} |
1.4.0 | GHSA-w9fg-xffh-p362 | 2021-08-31T21:08:01Z | 2021-04-13T15:12:51Z | null | ['CVE-2021-21394'] | Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
The issue is fixed by #9321.
### Workarounds
Depending on the needs and configuration of the homeserver a few options are available:
1. Using email as third-party identifiers be disabled by not configuring the `email` setting.
2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured.
3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy:
* `^/_matrix/client/(r0|unstable)/register/email`
* `^/_matrix/client/(r0|unstable)/register/msisdn`
* `^/_matrix/client/(r0|unstable)/account/password`
* `^/_matrix/client/(r0|unstable)/account/3pid` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:01:40Z', 'nvd_published_at': '2021-04-12T21:15:00Z'} |
1.4.0 | GHSA-7359-3c6r-hfc2 | 2023-01-24T14:59:50Z | 2021-04-22T16:22:15Z | null | ['CVE-2016-11086'] | Improper Certificate Validation in oauth ruby gem | lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauth-xx/oauth-ruby'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/oauth'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:23:58Z', 'nvd_published_at': '2020-09-24T20:15:00Z'} |
1.4.0 | GHSA-jgpv-4h4c-xhw3 | 2021-04-22T17:01:01Z | 2021-04-23T16:54:36Z | null | [] | Uncontrolled Resource Consumption in pillow | ### Impact
_Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._
### Patches
_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
### Workarounds
_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
### References
https://nvd.nist.gov/vuln/detail/CVE-2021-27921
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.1.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:01:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p48w-vf3c-rqjx | 2021-04-27T19:43:14Z | 2021-04-29T21:51:21Z | null | ['CVE-2021-21365'] | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
### Solution
Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365'}, {'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:43:14Z', 'nvd_published_at': '2021-04-27T20:15:00Z'} |
1.4.0 | GHSA-fjq3-5pxw-4wj4 | 2023-09-07T15:55:33Z | 2021-04-07T21:06:30Z | null | ['CVE-2020-7965'] | Cross-Site Request Forgery in Webargs | flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.b1'}, {'fixed': '6.0.0b4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7965'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/commit/b9ee8b0aa668207a363d9fd21d967eeadb975c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#b4-2020-01-28'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#id11'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:19:18Z', 'nvd_published_at': '2020-01-29T15:15:00Z'} |
1.4.0 | GHSA-jrh7-mhhx-6h88 | 2021-08-31T21:07:44Z | 2021-04-13T15:12:40Z | null | ['CVE-2021-21393'] | Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints | ### Impact
Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.
### Patches
This issue is fixed by #9321 and #9393.
### Workarounds
The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default.
### Other information
Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:48:55Z', 'nvd_published_at': '2021-04-12T22:15:00Z'} |
1.4.0 | GHSA-c6p9-24rc-jr5h | 2021-04-21T19:02:43Z | 2021-04-22T16:15:15Z | null | ['CVE-2020-7744'] | Remote Code Execution and download tracking in Mintegral SDK | "This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background)." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mintegral.msdk:alphab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.6.01'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7744'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/remote-code-execution-rce-sourmint/'}, {'type': 'WEB', 'url': 'https://snyk.io/research/sour-mint-malicious-sdk/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:02:43Z', 'nvd_published_at': '2020-10-15T13:15:00Z'} |
1.4.0 | GHSA-ffw3-6mp6-jmvj | 2023-08-30T22:07:40Z | 2021-04-07T21:05:57Z | null | ['CVE-2021-26559'] | Improper Access Control in Apache Airflow | Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/1'}] | {'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:27:01Z', 'nvd_published_at': '2021-02-17T15:15:00Z'} |
1.4.0 | GHSA-rjww-2x8v-m9v9 | 2022-09-21T19:31:15Z | 2021-04-19T14:52:14Z | null | ['CVE-2020-36319'] | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8016'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8051'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}] | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:31Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-v7ff-8wcx-gmc5 | 2022-04-17T16:45:25Z | 2021-04-06T17:31:01Z | null | ['CVE-2021-28164'] | Authorization Before Parsing and Canonicalization in jetty | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.39'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html'}] | {'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:28:10Z', 'nvd_published_at': '2021-04-01T15:15:00Z'} |
1.4.0 | GHSA-cccf-7xw3-p2vr | 2022-02-11T21:12:25Z | 2021-04-30T17:28:33Z | null | ['CVE-2020-10719'] | HTTP Request Smuggling in Undertow | A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:37:37Z', 'nvd_published_at': '2020-05-26T16:15:00Z'} |
1.4.0 | GHSA-xwg3-qrcg-w9x6 | 2021-04-23T17:17:16Z | 2021-04-19T14:51:25Z | null | ['CVE-2021-31404'] | Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
- https://vaadin.com/security/cve-2021-31404 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9875'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:19Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-35q2-47q7-3pc3 | 2022-08-11T00:21:37Z | 2021-04-27T15:56:03Z | null | ['CVE-2021-29469'] | Node-Redis potential exponential regex in monitor mode | ### Impact
When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
### Patches
The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.
### References
#1569 (GHSL-2021-026) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0010/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T18:11:39Z', 'nvd_published_at': '2021-04-23T18:15:00Z'} |
1.4.0 | GHSA-gwrp-pvrq-jmwv | 2022-02-08T21:31:42Z | 2021-04-26T16:04:00Z | null | ['CVE-2021-29425'] | Path Traversal and Improper Input Validation in Apache Commons IO | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-io:commons-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/IO-556'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T15:21:31Z', 'nvd_published_at': '2021-04-13T07:15:00Z'} |
1.4.0 | GHSA-52qp-jpq7-6c54 | 2021-04-27T20:54:56Z | 2021-04-29T21:52:30Z | null | ['CVE-2021-29476'] | Insecure Deserialization of untrusted data in rmccue/requests | ### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
* https://github.com/ambionics/phpggc/issues/52
* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
Originally fixed in WordPress 5.5.2:
* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
Related Security Advisories:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
* https://nvd.nist.gov/vuln/detail/CVE-2020-28032
Notification to the Requests repo including a fix in:
* https://github.com/rmccue/Requests/pull/421 and
* https://github.com/rmccue/Requests/pull/422
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Request](https://github.com/WordPress/Requests/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rmccue/requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/rmccue/Requests/pull/421'}, {'type': 'WEB', 'url': 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}, {'type': 'WEB', 'url': 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/'}, {'type': 'WEB', 'url': 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf'}, {'type': 'WEB', 'url': 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml'}, {'type': 'WEB', 'url': 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf'}, {'type': 'WEB', 'url': 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f'}, {'type': 'WEB', 'url': 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:54:56Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-4c7m-wxvm-r7gc | 2022-04-01T20:21:55Z | 2021-04-14T15:03:16Z | null | ['CVE-2021-28918'] | Improper parsing of octal bytes in netmask | Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pch5-whg9-qr2r'}, {'type': 'PACKAGE', 'url': 'https://github.com/rs/node-netmask/'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021'}, {'type': 'WEB', 'url': 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md'}, {'type': 'WEB', 'url': 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0010/'}, {'type': 'WEB', 'url': 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:13:23Z', 'nvd_published_at': '2021-04-01T13:15:00Z'} |
1.4.0 | GHSA-whq6-mj2r-mjqc | 2021-03-29T22:11:57Z | 2021-04-13T15:17:53Z | null | ['CVE-2019-10783'] | OS Command Injection in lsof | All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lsof'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LSOF-543632'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:57Z', 'nvd_published_at': '2020-01-29T22:15:00Z'} |
1.4.0 | GHSA-hh8v-jmh3-9437 | 2021-04-06T21:51:28Z | 2021-04-13T15:25:33Z | null | ['CVE-2020-8823'] | Cross-site scripting in SocksJS-node | htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}, {'type': 'WEB', 'url': 'https://www.sockjs.org'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:51:28Z', 'nvd_published_at': '2020-02-10T03:15:00Z'} |
1.4.0 | GHSA-5wrh-4jwv-5w78 | 2021-08-31T21:07:35Z | 2021-04-13T15:13:08Z | null | ['CVE-2021-21392'] | Open redirect via transitional IPv6 addresses on dual-stack networks | ### Impact
Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks.
### Patches
This issue is fixed by #9240.
### Workarounds
Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems:
* `::ffff/80`
* `::0000/80` (note that this IP range is considered deprecated by the IETF)
* `2002::/16` (note that this IP range is considered deprecated by the IETF)
### References
* [RFC3056](https://tools.ietf.org/html/rfc3056)
* [RFC4291](https://tools.ietf.org/html/rfc4291) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21392'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9240'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:51:49Z', 'nvd_published_at': '2021-04-12T22:15:00Z'} |
1.4.0 | GHSA-rp4x-wxqv-cf9m | 2021-04-16T23:17:25Z | 2021-04-19T14:52:29Z | null | ['CVE-2019-25027'] | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/5498'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}] | {'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-g4cp-h53p-v3v8 | 2022-02-11T21:12:32Z | 2021-04-30T17:28:42Z | null | ['CVE-2020-10705'] | Allocation of Resources Without Limits or Throttling in Undertow | A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1803241'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:36:15Z', 'nvd_published_at': '2020-06-10T20:15:00Z'} |
1.4.0 | GHSA-gfr2-qpxh-qj9m | 2022-05-05T21:55:25Z | 2021-04-07T20:35:24Z | null | ['CVE-2020-1735'] | Path Traversal in Ansible | A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67793'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:54:51Z', 'nvd_published_at': '2020-03-16T16:15:00Z'} |
1.4.0 | GHSA-pxcc-hj8w-fmm7 | 2021-03-31T18:00:32Z | 2021-04-06T17:25:12Z | null | ['CVE-2021-21414'] | Command injection vulnerability in @prisma/sdk in getPackedPackage function | ### Impact
As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability.
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
### Patches
Fixed in
- @prisma/sdk@2.20.0 (latest channel)
- @prisma/sdk@2.20.0-dev.29 (dev channel)
Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245)
### Acknowledgements
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
### For more information
If you have any questions or comments about this advisory:
- Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions)
- Email us at security@prisma.io | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@prisma/sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414'}, {'type': 'WEB', 'url': 'https://github.com/prisma/prisma/pull/6245'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0003/'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:00:32Z', 'nvd_published_at': '2021-04-29T01:15:00Z'} |
1.4.0 | GHSA-wmg4-8cp2-hpg9 | 2022-08-11T13:18:23Z | 2021-04-19T14:54:04Z | null | ['CVE-2021-29430'] | Sydent vulnerable to denial of service attack via memory exhaustion | ### Impact
Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.
Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service.
This affects any server which accepts registration requests from untrusted clients.
### Patches
Patched by 89071a1, 0523511, f56eee3.
### Workarounds
Request sizes can be limited in an HTTP reverse-proxy.
There are no known workarounds for the problem with overlarge responses.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}] | {'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:49:34Z', 'nvd_published_at': '2021-04-15T21:15:00Z'} |
1.4.0 | GHSA-qgp4-5qx6-548g | 2021-04-27T20:11:58Z | 2021-04-30T17:30:06Z | null | ['CVE-2021-29460'] | Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby | ### Impact
An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim.
This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
Visitors without Panel access can only use this attack vector if your site allows SVG or XML file uploads in frontend forms and you don't already validate or sanitize uploaded SVG or XML files.
The attack requires user interaction by another user or visitor and *cannot* be automated.
### Patches
#### Uploads in the Panel
The problem has been patched in [Kirby 3.5.4](https://github.com/getkirby/kirby/releases/tag/3.5.4) by validating uploaded SVG and XML files and rejecting potentially harmful files. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
#### Frontend upload forms
Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to Kirby 3.5.4+.
#### Validate existing files
Already uploaded files are *not* automatically validated again. If you are not sure if you have been impacted by this vulnerability in the past, we recommend to run all site files through the validator classes after updating to Kirby 3.5.4. You can use the following test script by pasting it into a template or uploading it to your web root:
```php
<?php
@include_once __DIR__ . '/kirby/bootstrap.php';
if (version_compare(kirby()->version(), '3.5.4', '<') === true) {
die('This script requires Kirby 3.5.4+.');
}
$objects = [
// the site itself
site(),
// all pages and drafts
...site()->index(true)->values(),
// all users
...kirby()->users()->values()
];
$errors = false;
foreach ($objects as $object) {
foreach ($object->files() as $file) {
try {
// validate the contents lazily
// (if a validator exists)
$file->validateContents(true);
} catch (\Kirby\Exception\InvalidArgumentException $e) {
echo $file->id() . ': ' . $e->getMessage() . "<br>\n";
$errors = true;
}
}
}
if ($errors === false) {
echo 'No validation errors found.';
}
```
You only need to run this validator script once as future uploads will automatically be validated. If the script prints "No validation errors found", you have not been impacted by the vulnerability so far.
Errors that it lists may or may not be critical as our validator classes also catch files with an invalid data structure or less harmful attacks like the ["billion laughs" denial-of-service attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) or the usage of external sources. We recommend to review and fix each listed error manually until the script no longer finds any validation errors.
**Please delete the script again after you have used it.**
### Workarounds
If you cannot update to Kirby 3.5.4, you can disable the upload of SVG and XML files in your [file blueprints](https://getkirby.com/docs/reference/panel/blueprints/file#accept) and validate or replace your already uploaded files once.
### Credits
Thanks to @sreenathr10 for reporting the problem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29460'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.4'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:11:58Z', 'nvd_published_at': '2021-04-27T20:15:00Z'} |
1.4.0 | GHSA-82mf-mmh7-hxp5 | 2021-10-08T21:23:58Z | 2021-04-19T14:48:15Z | null | [] | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qgcg-p3v2-9h4p | 2021-04-27T21:33:12Z | 2021-04-30T17:29:42Z | null | ['CVE-2020-5412'] | Externally Controlled Reference to a Resource in Another Sphere and Confused Deputy in Spring Cloud Netflix | Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5412'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5412'}] | {'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:33:12Z', 'nvd_published_at': '2020-08-07T21:15:00Z'} |
1.4.0 | GHSA-jqj4-r483-4gvr | 2021-10-08T21:23:23Z | 2021-04-19T14:48:51Z | null | [] | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '13.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}] | {'cwe_ids': ['CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2548-q746-x5x6 | 2021-03-22T20:46:47Z | 2021-04-13T15:20:49Z | null | ['CVE-2021-23359'] | Code injection in port-killer | This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'port-killer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23359'}, {'type': 'WEB', 'url': 'https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533'}] | {'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:46:47Z', 'nvd_published_at': '2021-03-18T13:15:00Z'} |
1.4.0 | GHSA-qwwg-gc55-qqrv | 2021-04-13T15:54:30Z | 2021-04-13T15:54:40Z | null | ['CVE-2020-17131'] | Out-of-bounds Write in Chakra | Chakra Scripting Engine Memory Corruption Vulnerability | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17131'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6531'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:08:14Z', 'nvd_published_at': '2020-12-10T00:15:00Z'} |
1.4.0 | GHSA-3h5r-928v-mxhh | 2021-10-08T21:22:53Z | 2021-04-19T14:49:13Z | null | [] | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}] | {'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h5h8-pc6h-jvvx | 2022-08-11T00:19:18Z | 2021-04-29T21:52:04Z | null | ['CVE-2021-29472'] | Composer's missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial | URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system.
### Impact
- The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins.
- The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote command injection. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone.
- Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately
### Patches
1.10.22 and 2.0.13 include patches for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/php-supply-chain-attack-on-composer/'}, {'type': 'WEB', 'url': 'https://getcomposer.org/'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4907'}] | {'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:33:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-2pwh-52h7-7j84 | 2021-04-13T17:35:23Z | 2021-04-16T19:52:49Z | null | [] | JavaScript execution via malicious molfiles (XSS) | ### Impact
The viewer plugin implementation of `<mol:molecule>` renders molfile data directly inside a `<script>` tag without any escaping. Arbitrary JavaScript code can thus be executed in the client browser via crafted molfiles.
### Patches
Patched in v0.3.0: Molfile data is now rendered as value of a hidden `<input>` tag and escaped via JSF's mechanisms.
### Workarounds
No workaround available. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'de.ipb-halle:molecularfaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:35:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gcm9-cc3r-c6vj | 2021-03-29T22:10:04Z | 2021-04-13T15:18:09Z | null | ['CVE-2020-27224'] | Cross-site Scripting (XSS) in Eclipse Theia | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@theia/preview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/7954'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7971'}, {'type': 'WEB', 'url': 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:10:04Z', 'nvd_published_at': '2021-02-24T17:15:00Z'} |
1.4.0 | GHSA-gwr8-5j83-483c | 2022-04-26T17:59:52Z | 2021-04-20T16:44:22Z | null | ['CVE-2019-14904'] | OS Command Injection and Improper Input Validation in ansible | A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14904'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/65686'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T13:24:57Z', 'nvd_published_at': '2020-08-26T03:15:00Z'} |
1.4.0 | GHSA-rhwf-hqpr-q8g2 | 2021-04-07T19:36:21Z | 2021-04-13T15:24:38Z | null | ['CVE-2020-8129'] | Code Injection in script-manager | An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'script-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8129'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660563'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:36:21Z', 'nvd_published_at': '2020-02-14T22:15:00Z'} |
1.4.0 | GHSA-mh74-4m5g-fcjx | 2022-08-11T13:17:50Z | 2021-04-19T14:54:24Z | null | ['CVE-2021-29432'] | Malicious users could abuse Sydent to control the content of invitation emails | ### Impact
A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example.
### Patches
Fixed in 4469d1d, 6b405a8, 65a6e91.
Note that these patches include changes to the *default* email templates. If these templates have been locally modified, they must also be updated.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29432'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:47:15Z', 'nvd_published_at': '2021-04-15T21:15:00Z'} |
1.4.0 | GHSA-63rq-p8fp-524q | 2021-04-12T18:44:12Z | 2021-04-13T15:12:06Z | null | [] | Potential API key leak | If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel.
This is patched in v1.2.4 | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'sopel-modules.weather'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:44:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrx6-fmxq-rjj2 | 2023-02-13T17:27:22Z | 2021-04-30T17:35:15Z | null | ['CVE-2020-25658'] | Timing attacks in python-rsa | It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25658'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/165'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:5634'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:0637'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:1716'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2020-25658'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1889972'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658'}, {'type': 'PACKAGE', 'url': 'https://github.com/sybrenstuvel/python-rsa'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/'}] | {'cwe_ids': ['CWE-327', 'CWE-385'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:11:41Z', 'nvd_published_at': '2020-11-12T14:15:00Z'} |
1.4.0 | GHSA-53xj-v576-3ch2 | 2022-06-17T20:44:20Z | 2021-04-13T15:22:09Z | null | ['CVE-2019-10802'] | OS Command Injection in giting | giting version prior to 0.0.8 allows execution of arbritary commands. The first argument `repo` of function `pull()` is executed by the package without any validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'giting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}, {'type': 'PACKAGE', 'url': 'https://github.com/MangoRaft/git'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITING-559008'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208120654/https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:50:02Z', 'nvd_published_at': '2020-02-28T21:15:00Z'} |
1.4.0 | GHSA-42j4-733x-5vcf | 2021-04-16T23:15:27Z | 2021-04-19T14:49:32Z | null | ['CVE-2020-36320'] | Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7 | Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2020-36320 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.22'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/issues/7757'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12104'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36320'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:27Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-ccgm-3xw4-h5p8 | 2021-04-19T21:54:20Z | 2021-04-20T16:30:03Z | null | ['CVE-2021-29421'] | Improper Restriction of XML External Entity Reference in pikepdf | models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pikepdf'}, 'ecosystem_specific': {'affected_functions': ['pikepdf.models.metadata.XMLParser', 'pikepdf.models.metadata.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421'}, {'type': 'WEB', 'url': 'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36P4HTLBJPO524WMQWW57N3QRF4RFSJG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:54:20Z', 'nvd_published_at': '2021-04-01T20:15:00Z'} |
1.4.0 | GHSA-j9wr-49vq-rm5g | 2021-10-08T21:24:54Z | 2021-04-19T14:46:49Z | null | [] | Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19 | Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
- https://vaadin.com/security/cve-2021-31407 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '14.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0.1'}]}], 'versions': ['19.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-j9wr-49vq-rm5g'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}] | {'cwe_ids': ['CWE-402'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-86hp-cj9j-33vv | 2021-08-30T23:28:52Z | 2021-04-07T20:33:26Z | null | ['CVE-2020-1753'] | Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible | A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1753'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/kubernetes/pull/51'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-collections/kubernetes'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:15:45Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-2fw4-mgq9-39cx | 2021-04-21T21:15:38Z | 2021-04-22T15:53:45Z | null | ['CVE-2017-18924'] | Code Injection in oauth2-server | "oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'" | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'oauth2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/pull/452'}, {'type': 'WEB', 'url': 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc7636'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:15:38Z', 'nvd_published_at': '2020-10-04T05:15:00Z'} |
1.4.0 | GHSA-mr8h-j9cv-4m8h | 2021-04-22T14:30:10Z | 2021-04-22T16:11:17Z | null | ['CVE-2021-31408'] | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '19.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31408'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}] | {'cwe_ids': ['CWE-287', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:30:10Z', 'nvd_published_at': '2021-04-23T17:15:00Z'} |
1.4.0 | GHSA-9h6g-6mxg-vvp4 | 2021-10-08T21:24:35Z | 2021-04-19T14:47:18Z | null | [] | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0.1'}]}], 'versions': ['19.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}] | {'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77pw-c3j2-5fc8 | 2023-08-31T15:48:04Z | 2021-04-30T17:34:03Z | null | ['CVE-2020-13952'] | Plaintext password leak in Apache Superset | In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.37.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13952'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:18:16Z', 'nvd_published_at': '2020-09-30T21:15:00Z'} |
1.4.0 | GHSA-49r2-73m6-pp8f | 2021-04-23T17:13:44Z | 2021-04-19T14:51:58Z | null | ['CVE-2020-36321'] | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9392'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-fc42-h7q4-qp8h | 2021-03-22T18:24:32Z | 2021-04-13T15:16:20Z | null | ['CVE-2021-23360'] | Command Injection in killport | This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'killport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:24:32Z', 'nvd_published_at': '2021-03-21T16:15:00Z'} |
1.4.0 | GHSA-vgv5-cxvh-vfxh | 2022-11-08T18:16:44Z | 2021-04-07T20:50:57Z | null | ['CVE-2020-26759'] | Arbitrary code execution in clickhouse-driver | clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'clickhouse-driver'}, 'ecosystem_specific': {'affected_functions': ['clickhouse_driver.bufferedreader.BufferedReader', 'clickhouse_driver.bufferedreader.BufferedReader.read', 'clickhouse_driver.bufferedreader.BufferedReader.read_strings', 'clickhouse_driver.bufferedwriter.BufferedWriter', 'clickhouse_driver.bufferedwriter.BufferedWriter.__init__', 'clickhouse_driver.bufferedwriter.BufferedWriter.write']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26759'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/d708ed548e1d6f254ba81a21de8ba543a53b5598'}, {'type': 'PACKAGE', 'url': 'https://github.com/mymarilyn/clickhouse-driver'}] | {'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:25:07Z', 'nvd_published_at': '2021-01-06T13:15:00Z'} |
1.4.0 | GHSA-2f6g-w5gj-c93h | 2021-03-22T23:02:01Z | 2021-04-13T15:20:09Z | null | ['CVE-2021-23328'] | Prototype Pollution in iniparserjs | This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'iniparserjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23328'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/iniparserjs'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:02:01Z', 'nvd_published_at': '2021-01-29T17:15:00Z'} |
1.4.0 | GHSA-hhx9-p69v-cx2j | 2023-09-20T18:19:48Z | 2021-04-30T17:34:13Z | null | ['CVE-2020-13927'] | Authentication bypass in Apache Airflow | "The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default" | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'}, {'type': 'WEB', 'url': 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/1.10.11'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:30:46Z', 'nvd_published_at': '2020-11-10T16:15:00Z'} |
1.4.0 | GHSA-hmv2-79q8-fv6g | 2021-04-22T22:04:31Z | 2021-04-30T17:31:43Z | null | ['CVE-2020-7212'] | Uncontrolled Resource Consumption in urllib3 | The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.2'}, {'fixed': '1.25.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.25.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7212'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.25.8/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:04:31Z', 'nvd_published_at': '2020-03-06T20:15:00Z'} |
1.4.0 | GHSA-86vp-x3pr-79rx | 2022-08-11T16:58:14Z | 2021-04-20T16:40:14Z | null | ['CVE-2020-17515'] | Apache Airflow Cross-site scripting due to incomplete fix for CVE-2020-13944 | The `origin` parameter passed to some of the endpoints like `/trigger` was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17515'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/14738'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/1.10.15'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/2.0.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pypi.org/project/apache-airflow'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/11/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/01/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T23:23:06Z', 'nvd_published_at': '2020-12-11T14:15:00Z'} |
1.4.0 | GHSA-3p3h-qghp-hvh2 | 2023-08-31T16:36:07Z | 2021-04-20T16:30:26Z | null | ['CVE-2020-28724'] | Open Redirect in werkzeug | Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/issues/1639'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/issues/822'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/pull/890/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:51:30Z', 'nvd_published_at': '2020-11-18T15:15:00Z'} |
1.4.0 | GHSA-jmx8-355m-8vwh | 2021-04-16T23:18:28Z | 2021-04-19T14:53:09Z | null | ['CVE-2018-25007'] | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/4774'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}] | {'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:18:28Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-w8h4-vw8f-rvvj | 2023-09-12T19:22:22Z | 2021-04-13T15:30:09Z | null | ['CVE-2021-26276'] | Improper Control of Dynamically-Managed Code Resources in config-shield | scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. **NOTE:** the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'config-shield'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}, {'type': 'WEB', 'url': 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4773'}, {'type': 'PACKAGE', 'url': 'https://github.com/godaddy/node-config-shield'}] | {'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:44:52Z', 'nvd_published_at': '2021-01-27T20:15:00Z'} |
1.4.0 | GHSA-79qm-h35f-hr77 | 2022-01-04T19:48:58Z | 2021-04-13T15:23:13Z | null | ['CVE-2019-10799'] | OS Command Injection in compile-sass | compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'compile-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799'}, {'type': 'WEB', 'url': 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/eiskalteschatten/compile-sass'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:21:56Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-vh8f-xw5v-8993 | 2021-04-12T19:01:01Z | 2021-04-12T19:01:20Z | null | ['CVE-2020-7786'] | Command Injection in macfromip | All versions of npm package macfromip are affected by a command injection vulnerability. The injection point is located in line 66 in macfromip.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'macfromip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/macfromip'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:59:04Z', 'nvd_published_at': '2021-02-08T19:15:00Z'} |
1.4.0 | GHSA-c43q-5hpj-4crv | 2021-04-22T19:22:31Z | 2021-04-23T16:55:01Z | null | ['CVE-2021-28168'] | Local information disclosure via system temporary directory | ## Impact
Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.
## Workaround
This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM.
## Patches
Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey.
### References
- https://github.com/eclipse-ee4j/jersey/pull/4712
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
## Similar Vulnerabilities
Similar, but not the same:
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
- Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
---
Original Disclosure:
> Hello Jersey Security Team,
>
> Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability.
>
> You can see the custom CodeQL query utilized here:
> https://lgtm.com/query/8831016213790320486/
>
> This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user.
>
> This vulnerability impacts the following locations in this project's source:
>
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208
>
> This vulnerability exists because of the vulnerability in the `Utils.createTempFile`:
>
> https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53
>
> This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system.
>
> If there is sensitive information written to these files, it is disclosed to other local users on this system.
>
> The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:jersey-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.28'}, {'fixed': '2.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:jersey-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/pull/4712'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-668', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T19:22:31Z', 'nvd_published_at': '2021-04-22T18:15:00Z'} |
1.4.0 | GHSA-8h84-8j4f-p97q | 2021-04-07T20:24:23Z | 2021-04-13T15:24:21Z | null | ['CVE-2019-10792'] | Injection in bodymen | bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}, {'type': 'WEB', 'url': 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T20:24:23Z', 'nvd_published_at': '2020-02-18T16:15:00Z'} |
1.4.0 | GHSA-r9vm-rhmf-7hxx | 2021-03-29T23:01:10Z | 2021-04-13T15:17:06Z | null | ['CVE-2019-10787'] | OS Command Injection in im-resize | im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'im-resize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T23:01:10Z', 'nvd_published_at': '2020-02-04T21:15:00Z'} |
1.4.0 | GHSA-rpw6-9xfx-jvcx | 2023-07-05T23:20:00Z | 2021-04-22T16:20:36Z | null | ['CVE-2020-36193'] | Directory Traversal in Archive_Tar | Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
### :exclamation: Note:
There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36193'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-36193.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4894'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-001'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:56:54Z', 'nvd_published_at': '2021-01-18T20:15:00Z'} |
1.4.0 | GHSA-9w8r-397f-prfh | 2023-08-07T11:25:58Z | 2021-04-20T16:35:47Z | null | ['CVE-2021-20270'] | Infinite Loop in Pygments | An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20270'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/f91804ff4772e3ab41f46e28d370f57898700333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1922136'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4889'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:58:03Z', 'nvd_published_at': '2021-03-23T17:15:00Z'} |
1.4.0 | GHSA-75c5-f4gw-38r9 | 2023-07-05T23:21:01Z | 2021-04-22T16:20:59Z | null | ['CVE-2020-28949'] | Multiple vulnerabilities through filename manipulation in Archive_Tar | Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4817'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-013'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:20:31Z', 'nvd_published_at': '2020-11-19T19:15:00Z'} |
1.4.0 | GHSA-pghf-347x-c2gj | 2021-04-14T22:22:37Z | 2021-04-16T19:53:28Z | null | ['CVE-2021-30459'] | SQL Injection via in django-debug-toolbar | ### Impact
With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form.
**NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**.
Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue.
### Patches
Please upgrade to one of the following versions, depending on the major version you're using:
- Version 1.x: [django-debug-toolbar 1.11.1](https://pypi.org/project/django-debug-toolbar/1.11.1/)
- Version 2.x: [django-debug-toolbar 2.2.1](https://pypi.org/project/django-debug-toolbar/2.2.1/)
- Version 3.x: [django-debug-toolbar 3.2.1](https://pypi.org/project/django-debug-toolbar/3.2.1/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [django-debug-toolbar repo](https://github.com/jazzband/django-debug-toolbar/issues/new) (Please NO SENSITIVE INFORMATION, send an email instead!)
* Email us at [security@jazzband.co](mailto:security@jazzband.co) | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-debug-toolbar/releases'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T22:22:37Z', 'nvd_published_at': '2021-04-14T18:15:00Z'} |
1.4.0 | GHSA-22wc-c9wj-6q2v | 2021-04-16T23:11:53Z | 2021-04-19T15:12:05Z | null | [] | VVE-2021-0001: Memory corruption using function calls within arrays | ### Impact
When performing a function call inside an array, there is a memory corruption issue that occurs because of an incorrect pointer to the the tip of the stack.
### Patches
This issue was partially fixed in [VVE-2020-0004](https://github.com/vyperlang/vyper/security/advisories/GHSA-2r3x-4mrv-mcxf), however the fix did not update similar code for arrays, which had a similar issue. The issue is fully fixed in https://github.com/vyperlang/vyper/pull/2345 | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2345'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/11b7b5b7e59bc9dc859d51cd41a924b59fe47c9e'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper'}] | {'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:11:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pw4v-gr34-2553 | 2022-07-22T16:32:37Z | 2021-04-16T19:53:37Z | null | ['CVE-2021-29433'] | Sydent DoS (via resource exhaustion) due to improper input validation | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
Fixed by 3175fd3.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29433'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/sydent'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}] | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T18:45:07Z', 'nvd_published_at': '2021-04-15T18:15:00Z'} |
1.4.0 | GHSA-xw22-wv29-3299 | 2021-04-02T17:05:21Z | 2021-04-06T17:29:52Z | null | ['CVE-2021-21421'] | ApiKey secret could be revelated on network issue | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too
### Patches
_Has the problem been patched? What versions should users upgrade to?_
creharmony/node-etsy-client#18 fixes this issue. This is fixed in [node-etsy-client v0.3.0](https://github.com/creharmony/node-etsy-client/tree/v0.3.0) and later.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Do not report or log etsy client error if you are using version <= v0.2.0
Update your version of node-etsy-client
### References
_Are there any links users can visit to find out more?_
- https://github.com/creharmony/node-etsy-client/issues/17 : On connect error secret appears in error #17
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/creharmony/node-etsy-client/issues](https://github.com/creharmony/node-etsy-client/issues/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-etsy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/security/advisories/GHSA-xw22-wv29-3299'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21421'}, {'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d'}] | {'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T17:05:21Z', 'nvd_published_at': '2021-04-01T22:15:00Z'} |
1.4.0 | GHSA-4hjq-422q-4vpx | 2022-08-10T23:35:31Z | 2021-04-06T17:20:58Z | null | ['CVE-2021-27908'] | Mautic vulnerable to secret data exfiltration via symfony parameters | ### Impact
Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
For example,
1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <`script> console.log("db password is: %mautic.db_password%"); </script>`
2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: <real password>`
Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
### Patches
Upgrade to 3.3.2
### Workarounds
No
### References
No
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27908'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-732', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:38:12Z', 'nvd_published_at': '2021-03-23T20:15:00Z'} |
1.4.0 | GHSA-23c7-6444-399m | 2022-10-25T20:51:03Z | 2021-04-09T15:42:40Z | null | ['CVE-2021-21431'] | Improper Input Validation in sopel-plugins.channelmgnt | ### Impact
On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once.
We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that.
Freenode is not affected.
### Patches
Upgrade to 2.0.1 or higher
### Workarounds
Do not use this plugin on networks where TARGMAX > 1.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/).
* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sopel-plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}] | {'cwe_ids': ['CWE-20', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T15:42:18Z', 'nvd_published_at': '2021-04-09T16:15:00Z'} |