schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-c2jg-hw38-jrqq | 2022-04-04T21:29:41Z | 2022-04-04T21:29:41Z | null | ['CVE-2022-24801'] | Inconsistent Interpretation of HTTP Requests in twisted.web | The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230:
1. The Content-Length header value could have a `+` or `-` prefix.
2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character.
3. Chunk lengths, which are expressed in hexadecimal format, could have a prefix of `0x`.
4. HTTP headers were stripped of all leading and trailing ASCII whitespace, rather than only space and HTAB (`\t`).
This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling.
### Impact
You may be affected if:
1. You use Twisted Web's HTTP 1.1 server and/or proxy
2. You also pass requests through a different HTTP server and/or proxy
The specifics of the other HTTP parser matter. The original report notes that some versions of Apache Traffic Server and HAProxy have been vulnerable in the past. HTTP request smuggling may be a serious concern if you use a proxy to perform request validation or access control.
The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected.
### Patches
The issue has been addressed in Twisted 22.4.0rc1 and later.
### Workarounds
Other than upgrading Twisted, you could:
* Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them
* Filter malformed requests by other means, such as configuration of an upstream proxy
### Credits
This issue was initially reported by [Zhang Zeyu](https://github.com/zeyu2001). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-195.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/releases/tag/twisted-22.4.0rc1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:29:41Z', 'nvd_published_at': '2022-04-04T18:15:00Z'} |
1.4.0 | GHSA-rh6c-jh4c-9fg3 | 2023-09-18T22:51:56Z | 2022-04-29T02:59:06Z | null | ['CVE-2004-1177'] | mailman Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-1177'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/18854'}, {'type': 'PACKAGE', 'url': 'https://github.com/terencehonles/mailman'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11113'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=110549296126351&w=2'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/13603'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2005/dsa-674'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDKSA-2005:015'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2005_07_mailman.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2005-235.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:56Z', 'nvd_published_at': '2005-01-10T05:00:00Z'} |
1.4.0 | GHSA-v5c9-98f7-2h54 | 2023-08-29T19:54:42Z | 2022-04-23T00:40:07Z | null | ['CVE-2012-2945'] | Hadoop symlink vulnerability | Hadoop 1.0.3 contains a symlink vulnerability as a result of storing pid files in the shared `/tmp` directory by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2945'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535861'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/3'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-2945'}] | {'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:54:42Z', 'nvd_published_at': '2019-10-29T19:15:00Z'} |
1.4.0 | GHSA-f99r-jjgr-f373 | 2022-04-18T22:23:05Z | 2022-04-06T00:01:30Z | null | ['CVE-2022-26986'] | SQL injection in ImpressCMS | SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:21:23Z', 'nvd_published_at': '2022-04-05T15:15:00Z'} |
1.4.0 | GHSA-j2x6-9323-fp7h | 2022-04-22T20:24:13Z | 2022-04-22T20:24:13Z | null | ['CVE-2022-24845'] | Integer bounds error in Vyper | ### Impact
in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions.
```vyper
interface iface:
def returns_int128() -> int128: view
def returns_Bytes33() -> Bytes[33]: view
x: iface
@external
def call_out():
x: int128 = self.x.returns_int128() # affected, <0.3.0
y: uint256 = convert(self.x.returns_int128(), uint256) # affected, <0.3.2
z: Bytes[33] = concat(self.x.returns_Bytes33(), b"") # affected >= 0.3.0, <0.3.2
```
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Break up operations involving external calls into multiple statements. For instance, instead of the example above, use
```
x: int128 = self.x.returns_int128()
y: uint256 = convert(x, uint256)
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24845'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-198.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:24:13Z', 'nvd_published_at': '2022-04-13T22:15:00Z'} |
1.4.0 | GHSA-vrgp-3ph6-2wwq | 2022-04-13T14:57:08Z | 2022-04-01T00:00:41Z | null | ['CVE-2021-36625'] | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-13T14:57:08Z', 'nvd_published_at': '2022-03-31T18:15:00Z'} |
1.4.0 | GHSA-4pc7-vqv5-5r3v | 2022-12-01T22:10:45Z | 2022-04-27T21:25:59Z | null | ['CVE-2021-3827'] | ECP SAML binding bypasses authentication flows | ### Description
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2007512'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:25:59Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-32rp-q37p-jg6w | 2022-04-28T21:12:15Z | 2022-04-20T00:00:30Z | null | ['CVE-2022-1384'] | Insecure plugin handling in Mattermost | Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:12:15Z', 'nvd_published_at': '2022-04-19T21:15:00Z'} |
1.4.0 | GHSA-c3g4-w6cv-6v7h | 2022-04-19T18:02:46Z | 2022-04-01T13:56:42Z | null | ['CVE-2022-27651'] | Non-empty default inheritable capabilities for linux container in Buildah | A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).
This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066840'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/buildah'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0417'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:56:42Z', 'nvd_published_at': '2022-04-04T20:15:00Z'} |
1.4.0 | GHSA-8wp2-vxpg-xcvp | 2022-05-05T13:47:28Z | 2022-04-26T00:00:43Z | null | ['CVE-2022-1457'] | Cross site scripting in facturascripts | facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'neorazorx/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.04'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T20:20:50Z', 'nvd_published_at': '2022-04-25T10:15:00Z'} |
1.4.0 | GHSA-g54x-29xv-58h5 | 2022-04-15T02:46:19Z | 2022-04-05T00:00:23Z | null | ['CVE-2021-43464'] | Remote code execution in Subrion | Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval(). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/888'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:16:10Z', 'nvd_published_at': '2022-04-04T18:15:00Z'} |
1.4.0 | GHSA-58hj-575g-5j25 | 2023-09-18T22:35:47Z | 2022-04-30T18:16:47Z | null | ['CVE-2001-0829'] | Apache Tomcat allows webmasters to insert xss into error messages | A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20061208015126/http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html'}] | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:35:47Z', 'nvd_published_at': '2001-12-06T05:00:00Z'} |
1.4.0 | GHSA-gcj7-j438-hjj2 | 2022-04-07T22:10:22Z | 2022-04-07T22:10:22Z | null | ['CVE-2022-24825'] | Smokescreen SSRF via deny list bypass | The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.
Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case.
### Recommendation
Upgrade Smokescreen to version 0.0.3 or later.
### Acknowledgements
Thanks to [Grzegorz Niedziela](https://twitter.com/gregxsunday) for reporting the issue.
### For more information
Email us at security@stripe.com | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24825'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}, {'type': 'PACKAGE', 'url': 'github.com/stripe/smokescreen'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:10:22Z', 'nvd_published_at': '2022-04-19T20:15:00Z'} |
1.4.0 | GHSA-rjvg-8v36-xv9r | 2023-04-11T14:26:34Z | 2022-04-26T00:00:42Z | null | ['CVE-2022-27103'] | element-plus vulnerable to cross-site scripting (XSS) via el-table-column | element-plus below 2.0.5 is vulnerable to Cross Site Scripting (XSS) when attribute `show-tooltips-overflow` of `el-table-column` is true. The mouseover action will make the text of this column render as html. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'element-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27103'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/issues/6514'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/pull/6520'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/commit/063c56446135176971f532bd0eb2e88a0b137d43'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/'}, {'type': 'PACKAGE', 'url': 'https://github.com/element-plus/element-plus'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T14:26:34Z', 'nvd_published_at': '2022-04-25T13:15:00Z'} |
1.4.0 | GHSA-j3gg-r6gp-95q2 | 2022-04-12T20:22:57Z | 2022-04-12T20:22:57Z | null | [] | XSS in HEEx class attributes | The `class` attribute was not protected against XSS attacks when using HEEx. | [] | [{'package': {'ecosystem': 'Hex', 'name': 'phoenix_html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix_html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:22:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2w5-725j-gf2g | 2022-05-26T19:43:23Z | 2022-04-20T16:21:03Z | null | ['CVE-2022-22143'] | Prototype Pollution in convict | ### Impact
* An attacker can inject attributes that are used in other components
* An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.
The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.
### Patches
The problem is patched in `convict@6.2.3`. Users should upgrade to `convict@6.2.3`.
### Workarounds
No way for users to fix or remediate the vulnerability without upgrading
### References
* https://www.huntr.dev/bounties/1-npm-convict/
* #384
* 3b86be087d8f14681a9c889d45da7fe3ad9cd880
* 1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75
### For more information
If you have any questions or comments about this advisory:
add your question as a comment in #384
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/pull/384'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/node-convict/'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-convict/'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T16:21:03Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-wf98-vxv9-jqfv | 2022-04-05T18:31:51Z | 2022-04-05T18:31:51Z | null | [] | XSS Injection Vulnerability | ### Impact
Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied.
### Patches
This has been patched in Craft 3.7.29.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18
### For more information
If you have any questions or comments about this advisory, email us at [support@craftcms.com](mailto:support@craftcms.com)
----------
Credits: https://github.com/noobpk
| [] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.29'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g29-fccr-p59w | 2022-04-28T20:59:24Z | 2022-04-28T20:59:24Z | null | ['CVE-2022-24873'] | Reflected Cross-site Scripting in Shopware storefront | ### Impact
Not-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:59:24Z', 'nvd_published_at': '2022-04-28T14:15:00Z'} |
1.4.0 | GHSA-ffjp-66mx-3qpj | 2022-04-07T18:31:32Z | 2022-04-06T00:01:30Z | null | ['CVE-2021-27116'] | Privilege escalation in beego | An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4484'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:31:32Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-f37q-q7p2-ccfc | 2022-04-26T13:05:37Z | 2022-04-14T00:00:17Z | null | ['CVE-2022-1337'] | Resource exhaustion in Mattermost | The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1337'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:05:37Z', 'nvd_published_at': '2022-04-13T18:15:00Z'} |
1.4.0 | GHSA-xm99-6pv5-q363 | 2023-05-24T17:39:54Z | 2022-04-23T00:03:03Z | 2023-05-24T17:39:14Z | ['CVE-2022-29583'] | Disputed: OS Command injection in github.com/kardianos/service | service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory.
The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter has requested that the CVE be [disputed](https://github.com/kardianos/service/issues/289#issuecomment-1110546798). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kardianos/service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29583'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/issues/289'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/pull/290'}, {'type': 'PACKAGE', 'url': 'https://github.com/kardianos/service'}] | {'cwe_ids': ['CWE-426', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:15:34Z', 'nvd_published_at': '2022-04-22T16:15:00Z'} |
1.4.0 | GHSA-h2xh-jvpf-xq42 | 2023-09-18T22:28:05Z | 2022-04-30T18:15:07Z | null | ['CVE-2000-1211'] | Zope does not properly perform security registration for legacy names | Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1211'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010910131909/http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-083.php3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021227061438/http://www.iss.net/security_center/static/5824.php'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2000-125.html'}, {'type': 'WEB', 'url': 'http://www.zope.org/Products/Zope/Hotfix_2000-12-08/security_alert'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:05Z', 'nvd_published_at': '2000-12-16T05:00:00Z'} |
1.4.0 | GHSA-wpr6-qvcq-8269 | 2022-12-01T23:57:35Z | 2022-04-13T00:00:17Z | null | ['CVE-2022-29046'] | Stored Cross-site Scripting vulnerability in Jenkins Subversion Plugin | Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29046'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/18'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:57:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-g94p-h263-c26q | 2022-05-26T19:41:20Z | 2022-04-23T00:03:01Z | null | ['CVE-2022-27340'] | Cross Site Request Forgery in Mingsoft MCMS | MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27340'}, {'type': 'WEB', 'url': 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:09:39Z', 'nvd_published_at': '2022-04-22T20:15:00Z'} |
1.4.0 | GHSA-2gwj-7jmv-h26r | 2023-09-05T19:23:06Z | 2022-04-13T00:00:33Z | null | ['CVE-2022-28346'] | SQL Injection in Django | An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. `QuerySet.annotate()`, `aggregate()`, and `extra()` methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed `**kwargs`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2044dac5c6968441be6f534c4139bcf48c5c7e48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2c09e68ec911919360d5f8502cefc312f9e03c5d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/800828887a0509ad1162d6d407e94d8de7eafc60'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-190.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5254'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/11/1'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:33:03Z', 'nvd_published_at': '2022-04-12T05:15:00Z'} |
1.4.0 | GHSA-mwm4-5qwr-g9pf | 2022-04-28T21:00:31Z | 2022-04-28T21:00:31Z | null | [] | Keycloak is vulnerable to IDN homograph attack | A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:00:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h73-w7ch-rh73 | 2022-04-12T21:26:27Z | 2022-04-12T21:26:27Z | null | ['CVE-2018-1000883'] | Header Injection | Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.0.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883'}, {'type': 'WEB', 'url': 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:26:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w98m-2xqg-9cvj | 2022-04-12T19:36:39Z | 2022-04-12T19:36:39Z | null | ['CVE-2020-15150'] | Remote Code Execution in paginator | There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.
### Impact
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version >= 1.0.0.
### Patches
The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5.
### Credits
Thank you to Peter Stöckli. | [] | [{'package': {'ecosystem': 'Hex', 'name': 'paginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15150'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/duffelhq/paginator'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/paginator'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T19:36:39Z', 'nvd_published_at': '2020-09-01T17:15:00Z'} |
1.4.0 | GHSA-f6p5-76fp-m248 | 2022-04-28T21:09:54Z | 2022-04-28T21:09:54Z | null | [] | URL Rewrite vulnerability in multiple zendframework components | zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism.
When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-feed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/ZF2018-01.yaml'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:09:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hf55-c445-2w97 | 2022-04-15T16:57:07Z | 2022-04-03T00:01:00Z | null | ['CVE-2022-21830'] | Cross-site Scripting in @rocket.chat/livechat | A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@rocket.chat/livechat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1091118'}, {'type': 'PACKAGE', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:57:47Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-p3w3-4ppm-c3f6 | 2022-04-29T21:02:47Z | 2022-04-29T00:00:23Z | null | ['CVE-2022-1514'] | Cross site scripting in FacturaScripts | FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:02:47Z', 'nvd_published_at': '2022-04-28T16:15:00Z'} |
1.4.0 | GHSA-28r6-jm5h-mrgg | 2022-04-07T18:13:46Z | 2022-04-06T00:01:30Z | null | ['CVE-2021-30080'] | Access control bypass in Beego | An issue was discovered in the route lookup process in beego through 2.0.1, allows attackers to bypass access control. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30080'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4459'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0572'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:13:46Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-r9w3-g83q-m6hq | 2022-04-13T16:28:10Z | 2022-04-01T17:26:03Z | null | ['CVE-2022-24802'] | Prototype Pollution in deepmerge-ts | deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deepmerge-ts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24802'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'}, {'type': 'PACKAGE', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:26:03Z', 'nvd_published_at': '2022-04-01T00:15:00Z'} |
1.4.0 | GHSA-7627-mp87-jf6q | 2022-04-04T21:58:52Z | 2022-04-02T00:00:13Z | null | ['CVE-2022-24440'] | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.2'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24440'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/124'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/commit/52a0d54464932a90ded5a59c71a016e8dec0ca84'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/commit/b70bc39c75645aa6d4a01a3ca6de40477c84f4b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cocoapods-downloader/CVE-2022-24440.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278'}] | {'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:58:52Z', 'nvd_published_at': '2022-04-01T18:15:00Z'} |
1.4.0 | GHSA-8m5h-hrqm-pxm2 | 2022-04-27T21:09:43Z | 2022-04-27T21:09:43Z | null | ['CVE-2022-23457'] | Path traversal in the OWASP Enterprise Security API | ### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.
### Patches
This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.
### Workarounds
Yes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.
### For more information
If you have any questions or comments about this advisory:
* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders".
* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230127-0014/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:43Z', 'nvd_published_at': '2022-04-25T20:15:00Z'} |
1.4.0 | GHSA-9hgc-wpc5-v8p9 | 2022-05-26T19:40:11Z | 2022-04-30T00:00:37Z | null | ['CVE-2022-1530'] | An attacker can execute malicious javascript in Live Helper Chat | Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.99'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:49:15Z', 'nvd_published_at': '2022-04-29T09:15:00Z'} |
1.4.0 | GHSA-gp7c-xmmm-7pqr | 2022-12-02T21:29:59Z | 2022-04-13T00:00:18Z | null | ['CVE-2022-29038'] | Stored Cross-site Scripting vulnerabilities in Jenkins Extended Choice Parameter Plugin | Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:29:59Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-hhr9-7xvh-8xgc | 2022-04-19T17:55:45Z | 2022-04-06T00:01:32Z | null | ['CVE-2022-1213'] | Server side request forgery in LiveHelperChat | SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.67'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213'}, {'type': 'WEB', 'url': 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:44:18Z', 'nvd_published_at': '2022-04-05T04:15:00Z'} |
1.4.0 | GHSA-gx8x-g87m-h5q6 | 2022-04-11T21:38:11Z | 2022-04-11T21:38:11Z | null | [] | Denial of Service (DoS) in Nokogiri on JRuby | ## Summary
Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).
See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information.
Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Impact
### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml
- **Severity**: High 7.5
- **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption
- **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.
- **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:38:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8hfj-j24r-96c4 | 2022-04-04T21:25:48Z | 2022-04-04T21:25:48Z | null | ['CVE-2022-24785'] | Path Traversal: 'dir/../../filename' in moment.locale | ### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarounds
Sanitize user-provided locale name before passing it to moment.js.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [moment repo](https://github.com/moment/moment)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment.locale']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220513-0006/'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}] | {'cwe_ids': ['CWE-22', 'CWE-27'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:25:48Z', 'nvd_published_at': '2022-04-04T17:15:00Z'} |
1.4.0 | GHSA-69p6-wvmq-27gg | 2023-07-03T23:11:16Z | 2022-04-20T00:00:33Z | null | ['CVE-2022-25648'] | Command injection in ruby-git | The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the `fetch(remote = 'origin', opts = {})` function, the remote parameter is passed to the `git fetch` subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/569'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-git/ruby-git'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git/CVE-2022-25648.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTJUF6SFPL4ZVSJQHGQ36KFPFO5DQVYZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q2V3HOFU4ZVTQZHAVAVL3EX2KU53SP7R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNJA7WPE67LJ3DJMWZ2TADHCZKWMY55/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270'}] | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:22Z', 'nvd_published_at': '2022-04-19T17:15:00Z'} |
1.4.0 | GHSA-5h7w-hmxc-99g5 | 2022-04-28T21:15:03Z | 2022-04-19T00:00:45Z | null | ['CVE-2022-1091'] | Cross site scripting in safe-svg | The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'darylldoyle/safe-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1091'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/commit/00cb9a86d1bff2214714557d1901ec3896564e50'}, {'type': 'PACKAGE', 'url': 'https://github.com/10up/safe-svg'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:15:03Z', 'nvd_published_at': '2022-04-18T18:15:00Z'} |
1.4.0 | GHSA-7gc6-qh9x-w6h8 | 2022-04-28T20:45:25Z | 2022-04-17T00:00:32Z | null | ['CVE-2022-1365'] | Incorrect Authorization in cross-fetch | When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty.
Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with provided cookie . | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/pull/135'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lquixada/cross-fetch'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac'}] | {'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:45:25Z', 'nvd_published_at': '2022-04-15T23:15:00Z'} |
1.4.0 | GHSA-rqrc-8q8f-cp9c | 2022-04-08T18:11:51Z | 2022-04-08T18:11:51Z | null | ['CVE-2020-1469'] | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Bond.Core.CSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/bond/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1'}] | {'cwe_ids': ['CWE-434', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T18:11:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5v4m-c73v-c7gq | 2022-04-12T21:23:43Z | 2022-04-12T21:23:43Z | null | ['CVE-2017-1000053'] | Arbitrary Code Execution in Cookie Serialization | The default serialization used by Plug session may result in code execution
in certain situations. Keep in mind, however, the session cookie is signed
and this attack can only be exploited if the attacker has access to your
secret key as well as your signing/encryption salts. We recommend users to
change their secret key base and salts if they suspect they have been leaked,
regardless of this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:23:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pfv6-prqm-85q8 | 2022-04-22T20:50:33Z | 2022-04-16T00:00:26Z | null | ['CVE-2022-24279'] | Prototype Pollution in madlib-object-utils | The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'madlib-object-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24279'}, {'type': 'WEB', 'url': 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Qwerios/madlib-object-utils'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:50:33Z', 'nvd_published_at': '2022-04-15T20:15:00Z'} |
1.4.0 | GHSA-3xpw-vhmv-cw7h | 2022-04-27T14:35:56Z | 2022-04-26T00:00:35Z | null | ['CVE-2022-25866'] | Command injection in czproject/git-php | The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'czproject/git-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}, {'type': 'PACKAGE', 'url': 'https://github.com/czproject/git-php'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/releases/tag/v4.0.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349'}] | {'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T14:35:56Z', 'nvd_published_at': '2022-04-25T17:15:00Z'} |
1.4.0 | GHSA-v6gp-9mmm-c6p5 | 2022-04-11T21:21:28Z | 2022-04-11T21:21:28Z | null | [] | Out-of-bounds Write in zlib affects Nokogiri | ## Summary
Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05.
Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements.
## Mitigation
Upgrade to Nokogiri `>= v1.13.4`.
## Impact
### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib
- **Severity**: High
- **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write
- **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc36-42cf-vqwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:21:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch3h-j2vf-95pv | 2023-06-07T15:35:54Z | 2022-04-27T22:32:49Z | null | ['CVE-2022-27777'] | XSS Vulnerability in Action View tag helpers | There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777.
Versions Affected: ALL
Not affected: NONE
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
If untrusted data is passed as the hash key for tag attributes, there is a possibility that the untrusted data may not be properly escaped which can lead to an XSS vulnerability.
Impacted code will look something like this:
```
check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' })
```
Where the "malicious_input" variable contains untrusted data.
All users running an affected release should either upgrade or use one of the workarounds immediately.
## Releases
The FIXED releases are available at the normal locations.
## Workarounds
Escape the untrusted data before using it as a key for tag helper methods.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2022-27777.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:32:49Z', 'nvd_published_at': '2022-05-26T17:15:00Z'} |
1.4.0 | GHSA-j739-gw6q-f4c7 | 2022-04-22T20:41:49Z | 2022-04-14T00:00:19Z | null | ['CVE-2020-29653'] | HTML Injection in Froxlor | Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/security/advisories'}, {'type': 'WEB', 'url': 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:41:49Z', 'nvd_published_at': '2022-04-13T13:15:00Z'} |
1.4.0 | GHSA-6p96-vfrc-fv32 | 2023-07-07T19:13:30Z | 2022-04-12T00:00:34Z | null | ['CVE-2022-27115'] | RCE in Studio-42 elFinder on Windows before 2.1.61 | In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27115'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3458'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/69be51eea5b484822a29ddd40f1b72845954ba60'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:13:30Z', 'nvd_published_at': '2022-04-11T15:15:00Z'} |
1.4.0 | GHSA-c4r5-xvgw-2942 | 2023-09-25T11:33:41Z | 2022-04-19T00:00:50Z | null | ['CVE-2021-3503'] | Metrics exposure in Wildfly | A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-metrics'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.0.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/14136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c4r5-xvgw-2942'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/wildfly'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/WFLY-11933'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0004/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:02Z', 'nvd_published_at': '2022-04-18T17:15:00Z'} |
1.4.0 | GHSA-5cmw-fhq9-8fhh | 2022-04-12T18:10:00Z | 2022-04-01T00:00:40Z | null | ['CVE-2022-1176'] | Type Confusion in LiveHelperChat | Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3'}] | {'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:41:31Z', 'nvd_published_at': '2022-03-31T10:15:00Z'} |
1.4.0 | GHSA-gprh-7767-cw39 | 2022-04-22T20:18:24Z | 2022-04-12T00:00:34Z | null | ['CVE-2021-40219'] | Code Injection in Bolt CMS | Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bolt/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/core'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php'}, {'type': 'WEB', 'url': 'https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219'}, {'type': 'WEB', 'url': 'http://boltcms.com'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:18:24Z', 'nvd_published_at': '2022-04-11T17:15:00Z'} |
1.4.0 | GHSA-p5rr-q5g6-gm42 | 2023-09-18T22:57:43Z | 2022-04-29T03:01:19Z | null | ['CVE-2004-2381'] | Jetty HTTP Server Denial of Service vulnerability | HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2381'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/15537'}, {'type': 'WEB', 'url': 'http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76'}, {'type': 'WEB', 'url': 'http://sourceforge.net/project/shownotes.php?release_id=224743'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/4387'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:57:43Z', 'nvd_published_at': '2004-12-31T05:00:00Z'} |
1.4.0 | GHSA-64fq-9c6w-rq44 | 2022-04-22T20:21:47Z | 2022-04-09T00:00:25Z | null | ['CVE-2021-43515'] | Improper Neutralization of Formula Elements in a CSV File in Kimai 2 | A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/2532'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}] | {'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:21:47Z', 'nvd_published_at': '2022-04-08T17:15:00Z'} |
1.4.0 | GHSA-g397-v4w5-4m79 | 2022-04-04T21:57:37Z | 2022-04-02T00:00:13Z | null | ['CVE-2022-21223'] | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/127'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cocoapods-downloader/CVE-2022-21223.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280'}] | {'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:57:37Z', 'nvd_published_at': '2022-04-01T18:15:00Z'} |
1.4.0 | GHSA-c2cp-3xj9-97w9 | 2022-05-04T03:52:42Z | 2022-04-22T00:00:33Z | null | ['CVE-2022-22969'] | Denial of service in Spring Security OAuth | Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22969'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:01:06Z', 'nvd_published_at': '2022-04-21T19:15:00Z'} |
1.4.0 | GHSA-2v7p-f4qm-r5pc | 2022-05-03T21:01:41Z | 2022-04-23T00:03:03Z | null | ['CVE-2022-1429'] | SQL Injection found in Pimcore | Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T21:01:41Z', 'nvd_published_at': '2022-04-22T09:15:00Z'} |
1.4.0 | GHSA-f9wg-5f46-cjmw | 2022-04-22T20:49:09Z | 2022-04-22T20:49:09Z | null | ['CVE-2022-24858'] | NextAuth.js default redirect callback vulnerable to open redirects | `next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option:
```js
// async redirect(url, baseUrl) { // v3
async redirect({ url, baseUrl }) { // v4
// Allows relative callback URLs
if (url.startsWith("/")) return new URL(url, baseUrl).toString()
// Allows callback URLs on the same origin
else if (new URL(url).origin === baseUrl) return url
return baseUrl
}
```
If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/callbacks#redirect-callback'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/getting-started/upgrade-v4'}] | {'cwe_ids': ['CWE-290', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:49:09Z', 'nvd_published_at': '2022-04-19T23:15:00Z'} |
1.4.0 | GHSA-q58j-fmvf-9rq6 | 2023-05-26T21:13:22Z | 2022-04-22T00:24:28Z | null | ['CVE-2011-1497'] | Cross site scripting in actionpack Rubygem | A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1497'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/61ee3449674c591747db95f9b3472c5c3bd9e84d'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/38df020c95beca7e12f0188cb7e18f3c37789e20/actionpack/CHANGELOG'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-1497.yml'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2011/04/06/13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:04Z', 'nvd_published_at': '2021-10-19T14:15:00Z'} |
1.4.0 | GHSA-xxx9-3xcr-gjj3 | 2022-04-11T21:30:00Z | 2022-04-11T21:30:00Z | null | [] | XML Injection in Xerces Java affects Nokogiri | ## Summary
Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record.
Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.
## Mitigation
Upgrade to Nokogiri `>= v1.13.4`.
## Impact
### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J
- **Severity**: Medium
- **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection)
- **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
- **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}] | {'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:30:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghcq-472w-vf4h | 2022-04-08T21:59:04Z | 2022-04-08T21:59:04Z | null | ['CVE-2022-24821'] | Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx | ### Impact
Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those.
### Patches
This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6.
### Workarounds
There's no easy workaround for this issue, administrators should upgrade their wiki.
### References
https://jira.xwiki.org/browse/XWIKI-19155
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki Security ML](mailto:security@xwiki.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.4.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19155'}] | {'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:59:04Z', 'nvd_published_at': '2022-04-08T19:15:00Z'} |
1.4.0 | GHSA-w5m2-299g-rff5 | 2022-04-26T12:59:00Z | 2022-04-26T12:59:00Z | null | ['CVE-2022-28820'] | Page Compare Reflected Cross-site Scripting (XSS) vulnerability | ### Impact
ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized.
An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful.
### Patches
This issue has been resolved in 5.2.0.
### Workarounds
None
### References
N/A
### For more information
If you have any questions or comments about this advisory open an issue in acs-aem-commons.
### Credit
This issue was discovered and reported by Black Lantern Security.
https://hackerone.com/reports/1466020 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28820'}, {'type': 'PACKAGE', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T12:59:00Z', 'nvd_published_at': '2022-04-21T19:15:00Z'} |