schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-c2jg-hw38-jrqq
2022-04-04T21:29:41Z
2022-04-04T21:29:41Z
null
['CVE-2022-24801']
Inconsistent Interpretation of HTTP Requests in twisted.web
The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230: 1. The Content-Length header value could have a `+` or `-` prefix. 2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character. 3. Chunk lengths, which are expressed in hexadecimal format, could have a prefix of `0x`. 4. HTTP headers were stripped of all leading and trailing ASCII whitespace, rather than only space and HTAB (`\t`). This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. ### Impact You may be affected if: 1. You use Twisted Web's HTTP 1.1 server and/or proxy 2. You also pass requests through a different HTTP server and/or proxy The specifics of the other HTTP parser matter. The original report notes that some versions of Apache Traffic Server and HAProxy have been vulnerable in the past. HTTP request smuggling may be a serious concern if you use a proxy to perform request validation or access control. The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected. ### Patches The issue has been addressed in Twisted 22.4.0rc1 and later. ### Workarounds Other than upgrading Twisted, you could: * Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them * Filter malformed requests by other means, such as configuration of an upstream proxy ### Credits This issue was initially reported by [Zhang Zeyu](https://github.com/zeyu2001).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-195.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/releases/tag/twisted-22.4.0rc1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:29:41Z', 'nvd_published_at': '2022-04-04T18:15:00Z'}
1.4.0
GHSA-rh6c-jh4c-9fg3
2023-09-18T22:51:56Z
2022-04-29T02:59:06Z
null
['CVE-2004-1177']
mailman Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-1177'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/18854'}, {'type': 'PACKAGE', 'url': 'https://github.com/terencehonles/mailman'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11113'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=110549296126351&w=2'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/13603'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2005/dsa-674'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDKSA-2005:015'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2005_07_mailman.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2005-235.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:56Z', 'nvd_published_at': '2005-01-10T05:00:00Z'}
1.4.0
GHSA-v5c9-98f7-2h54
2023-08-29T19:54:42Z
2022-04-23T00:40:07Z
null
['CVE-2012-2945']
Hadoop symlink vulnerability
Hadoop 1.0.3 contains a symlink vulnerability as a result of storing pid files in the shared `/tmp` directory by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2945'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535861'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/3'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-2945'}]
{'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:54:42Z', 'nvd_published_at': '2019-10-29T19:15:00Z'}
1.4.0
GHSA-f99r-jjgr-f373
2022-04-18T22:23:05Z
2022-04-06T00:01:30Z
null
['CVE-2022-26986']
SQL injection in ImpressCMS
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:21:23Z', 'nvd_published_at': '2022-04-05T15:15:00Z'}
1.4.0
GHSA-j2x6-9323-fp7h
2022-04-22T20:24:13Z
2022-04-22T20:24:13Z
null
['CVE-2022-24845']
Integer bounds error in Vyper
### Impact in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions. ```vyper interface iface: def returns_int128() -> int128: view def returns_Bytes33() -> Bytes[33]: view x: iface @external def call_out(): x: int128 = self.x.returns_int128() # affected, <0.3.0 y: uint256 = convert(self.x.returns_int128(), uint256) # affected, <0.3.2 z: Bytes[33] = concat(self.x.returns_Bytes33(), b"") # affected >= 0.3.0, <0.3.2 ``` ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Break up operations involving external calls into multiple statements. For instance, instead of the example above, use ``` x: int128 = self.x.returns_int128() y: uint256 = convert(x, uint256) ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24845'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-198.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:24:13Z', 'nvd_published_at': '2022-04-13T22:15:00Z'}
1.4.0
GHSA-vrgp-3ph6-2wwq
2022-04-13T14:57:08Z
2022-04-01T00:00:41Z
null
['CVE-2021-36625']
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-13T14:57:08Z', 'nvd_published_at': '2022-03-31T18:15:00Z'}
1.4.0
GHSA-4pc7-vqv5-5r3v
2022-12-01T22:10:45Z
2022-04-27T21:25:59Z
null
['CVE-2021-3827']
ECP SAML binding bypasses authentication flows
### Description A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2007512'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:25:59Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-32rp-q37p-jg6w
2022-04-28T21:12:15Z
2022-04-20T00:00:30Z
null
['CVE-2022-1384']
Insecure plugin handling in Mattermost
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:12:15Z', 'nvd_published_at': '2022-04-19T21:15:00Z'}
1.4.0
GHSA-c3g4-w6cv-6v7h
2022-04-19T18:02:46Z
2022-04-01T13:56:42Z
null
['CVE-2022-27651']
Non-empty default inheritable capabilities for linux container in Buildah
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066840'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/buildah'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0417'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:56:42Z', 'nvd_published_at': '2022-04-04T20:15:00Z'}
1.4.0
GHSA-8wp2-vxpg-xcvp
2022-05-05T13:47:28Z
2022-04-26T00:00:43Z
null
['CVE-2022-1457']
Cross site scripting in facturascripts
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'neorazorx/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.04'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T20:20:50Z', 'nvd_published_at': '2022-04-25T10:15:00Z'}
1.4.0
GHSA-g54x-29xv-58h5
2022-04-15T02:46:19Z
2022-04-05T00:00:23Z
null
['CVE-2021-43464']
Remote code execution in Subrion
Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval().
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/888'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:16:10Z', 'nvd_published_at': '2022-04-04T18:15:00Z'}
1.4.0
GHSA-58hj-575g-5j25
2023-09-18T22:35:47Z
2022-04-30T18:16:47Z
null
['CVE-2001-0829']
Apache Tomcat allows webmasters to insert xss into error messages
A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20061208015126/http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:35:47Z', 'nvd_published_at': '2001-12-06T05:00:00Z'}
1.4.0
GHSA-gcj7-j438-hjj2
2022-04-07T22:10:22Z
2022-04-07T22:10:22Z
null
['CVE-2022-24825']
Smokescreen SSRF via deny list bypass
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. ### Recommendation Upgrade Smokescreen to version 0.0.3 or later. ### Acknowledgements Thanks to [Grzegorz Niedziela](https://twitter.com/gregxsunday) for reporting the issue. ### For more information Email us at security@stripe.com
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24825'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}, {'type': 'PACKAGE', 'url': 'github.com/stripe/smokescreen'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:10:22Z', 'nvd_published_at': '2022-04-19T20:15:00Z'}
1.4.0
GHSA-rjvg-8v36-xv9r
2023-04-11T14:26:34Z
2022-04-26T00:00:42Z
null
['CVE-2022-27103']
element-plus vulnerable to cross-site scripting (XSS) via el-table-column
element-plus below 2.0.5 is vulnerable to Cross Site Scripting (XSS) when attribute `show-tooltips-overflow` of `el-table-column` is true. The mouseover action will make the text of this column render as html.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'element-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27103'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/issues/6514'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/pull/6520'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/commit/063c56446135176971f532bd0eb2e88a0b137d43'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/'}, {'type': 'PACKAGE', 'url': 'https://github.com/element-plus/element-plus'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T14:26:34Z', 'nvd_published_at': '2022-04-25T13:15:00Z'}
1.4.0
GHSA-j3gg-r6gp-95q2
2022-04-12T20:22:57Z
2022-04-12T20:22:57Z
null
[]
XSS in HEEx class attributes
The `class` attribute was not protected against XSS attacks when using HEEx.
[]
[{'package': {'ecosystem': 'Hex', 'name': 'phoenix_html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix_html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:22:57Z', 'nvd_published_at': None}
1.4.0
GHSA-x2w5-725j-gf2g
2022-05-26T19:43:23Z
2022-04-20T16:21:03Z
null
['CVE-2022-22143']
Prototype Pollution in convict
### Impact * An attacker can inject attributes that are used in other components * An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. ### Patches The problem is patched in `convict@6.2.3`. Users should upgrade to `convict@6.2.3`. ### Workarounds No way for users to fix or remediate the vulnerability without upgrading ### References * https://www.huntr.dev/bounties/1-npm-convict/ * #384 * 3b86be087d8f14681a9c889d45da7fe3ad9cd880 * 1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75 ### For more information If you have any questions or comments about this advisory: add your question as a comment in #384
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/pull/384'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/node-convict/'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-convict/'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T16:21:03Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-wf98-vxv9-jqfv
2022-04-05T18:31:51Z
2022-04-05T18:31:51Z
null
[]
XSS Injection Vulnerability
### Impact Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied. ### Patches This has been patched in Craft 3.7.29. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18 ### For more information If you have any questions or comments about this advisory, email us at [support@craftcms.com](mailto:support@craftcms.com) ---------- Credits: https://github.com/noobpk
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.29'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:51Z', 'nvd_published_at': None}
1.4.0
GHSA-4g29-fccr-p59w
2022-04-28T20:59:24Z
2022-04-28T20:59:24Z
null
['CVE-2022-24873']
Reflected Cross-site Scripting in Shopware storefront
### Impact Not-stored XSS in storefront. Request parameter were directly assigned to the template, so that malicious code could be send via an URL. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:59:24Z', 'nvd_published_at': '2022-04-28T14:15:00Z'}
1.4.0
GHSA-ffjp-66mx-3qpj
2022-04-07T18:31:32Z
2022-04-06T00:01:30Z
null
['CVE-2021-27116']
Privilege escalation in beego
An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4484'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:31:32Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-f37q-q7p2-ccfc
2022-04-26T13:05:37Z
2022-04-14T00:00:17Z
null
['CVE-2022-1337']
Resource exhaustion in Mattermost
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1337'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:05:37Z', 'nvd_published_at': '2022-04-13T18:15:00Z'}
1.4.0
GHSA-xm99-6pv5-q363
2023-05-24T17:39:54Z
2022-04-23T00:03:03Z
2023-05-24T17:39:14Z
['CVE-2022-29583']
Disputed: OS Command injection in github.com/kardianos/service
service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory. The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter has requested that the CVE be [disputed](https://github.com/kardianos/service/issues/289#issuecomment-1110546798).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kardianos/service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29583'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/issues/289'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/pull/290'}, {'type': 'PACKAGE', 'url': 'https://github.com/kardianos/service'}]
{'cwe_ids': ['CWE-426', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:15:34Z', 'nvd_published_at': '2022-04-22T16:15:00Z'}
1.4.0
GHSA-h2xh-jvpf-xq42
2023-09-18T22:28:05Z
2022-04-30T18:15:07Z
null
['CVE-2000-1211']
Zope does not properly perform security registration for legacy names
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1211'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010910131909/http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-083.php3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021227061438/http://www.iss.net/security_center/static/5824.php'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2000-125.html'}, {'type': 'WEB', 'url': 'http://www.zope.org/Products/Zope/Hotfix_2000-12-08/security_alert'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:05Z', 'nvd_published_at': '2000-12-16T05:00:00Z'}
1.4.0
GHSA-wpr6-qvcq-8269
2022-12-01T23:57:35Z
2022-04-13T00:00:17Z
null
['CVE-2022-29046']
Stored Cross-site Scripting vulnerability in Jenkins Subversion Plugin
Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29046'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/18'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:57:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-g94p-h263-c26q
2022-05-26T19:41:20Z
2022-04-23T00:03:01Z
null
['CVE-2022-27340']
Cross Site Request Forgery in Mingsoft MCMS
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27340'}, {'type': 'WEB', 'url': 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:09:39Z', 'nvd_published_at': '2022-04-22T20:15:00Z'}
1.4.0
GHSA-2gwj-7jmv-h26r
2023-09-05T19:23:06Z
2022-04-13T00:00:33Z
null
['CVE-2022-28346']
SQL Injection in Django
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. `QuerySet.annotate()`, `aggregate()`, and `extra()` methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed `**kwargs`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2044dac5c6968441be6f534c4139bcf48c5c7e48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2c09e68ec911919360d5f8502cefc312f9e03c5d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/800828887a0509ad1162d6d407e94d8de7eafc60'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-190.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5254'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/11/1'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:33:03Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-mwm4-5qwr-g9pf
2022-04-28T21:00:31Z
2022-04-28T21:00:31Z
null
[]
Keycloak is vulnerable to IDN homograph attack
A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:00:31Z', 'nvd_published_at': None}
1.4.0
GHSA-9h73-w7ch-rh73
2022-04-12T21:26:27Z
2022-04-12T21:26:27Z
null
['CVE-2018-1000883']
Header Injection
Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883'}, {'type': 'WEB', 'url': 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:26:27Z', 'nvd_published_at': None}
1.4.0
GHSA-w98m-2xqg-9cvj
2022-04-12T19:36:39Z
2022-04-12T19:36:39Z
null
['CVE-2020-15150']
Remote Code Execution in paginator
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. ### Impact There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version >= 1.0.0. ### Patches The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5. ### Credits Thank you to Peter Stöckli.
[]
[{'package': {'ecosystem': 'Hex', 'name': 'paginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15150'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/duffelhq/paginator'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/paginator'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T19:36:39Z', 'nvd_published_at': '2020-09-01T17:15:00Z'}
1.4.0
GHSA-f6p5-76fp-m248
2022-04-28T21:09:54Z
2022-04-28T21:09:54Z
null
[]
URL Rewrite vulnerability in multiple zendframework components
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism. When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-feed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/ZF2018-01.yaml'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:09:54Z', 'nvd_published_at': None}
1.4.0
GHSA-hf55-c445-2w97
2022-04-15T16:57:07Z
2022-04-03T00:01:00Z
null
['CVE-2022-21830']
Cross-site Scripting in @rocket.chat/livechat
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@rocket.chat/livechat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1091118'}, {'type': 'PACKAGE', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:57:47Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-p3w3-4ppm-c3f6
2022-04-29T21:02:47Z
2022-04-29T00:00:23Z
null
['CVE-2022-1514']
Cross site scripting in FacturaScripts
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:02:47Z', 'nvd_published_at': '2022-04-28T16:15:00Z'}
1.4.0
GHSA-28r6-jm5h-mrgg
2022-04-07T18:13:46Z
2022-04-06T00:01:30Z
null
['CVE-2021-30080']
Access control bypass in Beego
An issue was discovered in the route lookup process in beego through 2.0.1, allows attackers to bypass access control.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30080'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4459'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0572'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:13:46Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-r9w3-g83q-m6hq
2022-04-13T16:28:10Z
2022-04-01T17:26:03Z
null
['CVE-2022-24802']
Prototype Pollution in deepmerge-ts
deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deepmerge-ts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24802'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'}, {'type': 'PACKAGE', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:26:03Z', 'nvd_published_at': '2022-04-01T00:15:00Z'}
1.4.0
GHSA-7627-mp87-jf6q
2022-04-04T21:58:52Z
2022-04-02T00:00:13Z
null
['CVE-2022-24440']
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.2'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24440'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/124'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/commit/52a0d54464932a90ded5a59c71a016e8dec0ca84'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/commit/b70bc39c75645aa6d4a01a3ca6de40477c84f4b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cocoapods-downloader/CVE-2022-24440.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278'}]
{'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:58:52Z', 'nvd_published_at': '2022-04-01T18:15:00Z'}
1.4.0
GHSA-8m5h-hrqm-pxm2
2022-04-27T21:09:43Z
2022-04-27T21:09:43Z
null
['CVE-2022-23457']
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. ### Patches This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details. ### Workarounds Yes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended. ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230127-0014/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:43Z', 'nvd_published_at': '2022-04-25T20:15:00Z'}
1.4.0
GHSA-9hgc-wpc5-v8p9
2022-05-26T19:40:11Z
2022-04-30T00:00:37Z
null
['CVE-2022-1530']
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.99'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:49:15Z', 'nvd_published_at': '2022-04-29T09:15:00Z'}
1.4.0
GHSA-gp7c-xmmm-7pqr
2022-12-02T21:29:59Z
2022-04-13T00:00:18Z
null
['CVE-2022-29038']
Stored Cross-site Scripting vulnerabilities in Jenkins Extended Choice Parameter Plugin
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:29:59Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-hhr9-7xvh-8xgc
2022-04-19T17:55:45Z
2022-04-06T00:01:32Z
null
['CVE-2022-1213']
Server side request forgery in LiveHelperChat
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.67'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213'}, {'type': 'WEB', 'url': 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:44:18Z', 'nvd_published_at': '2022-04-05T04:15:00Z'}
1.4.0
GHSA-gx8x-g87m-h5q6
2022-04-11T21:38:11Z
2022-04-11T21:38:11Z
null
[]
Denial of Service (DoS) in Nokogiri on JRuby
## Summary Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity). See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Impact ### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml - **Severity**: High 7.5 - **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption - **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. - **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:38:11Z', 'nvd_published_at': None}
1.4.0
GHSA-8hfj-j24r-96c4
2022-04-04T21:25:48Z
2022-04-04T21:25:48Z
null
['CVE-2022-24785']
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarounds Sanitize user-provided locale name before passing it to moment.js. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [moment repo](https://github.com/moment/moment)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment.locale']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220513-0006/'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]
{'cwe_ids': ['CWE-22', 'CWE-27'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:25:48Z', 'nvd_published_at': '2022-04-04T17:15:00Z'}
1.4.0
GHSA-69p6-wvmq-27gg
2023-07-03T23:11:16Z
2022-04-20T00:00:33Z
null
['CVE-2022-25648']
Command injection in ruby-git
The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the `fetch(remote = 'origin', opts = {})` function, the remote parameter is passed to the `git fetch` subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/569'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-git/ruby-git'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/git/CVE-2022-25648.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTJUF6SFPL4ZVSJQHGQ36KFPFO5DQVYZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q2V3HOFU4ZVTQZHAVAVL3EX2KU53SP7R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNJA7WPE67LJ3DJMWZ2TADHCZKWMY55/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270'}]
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:22Z', 'nvd_published_at': '2022-04-19T17:15:00Z'}
1.4.0
GHSA-5h7w-hmxc-99g5
2022-04-28T21:15:03Z
2022-04-19T00:00:45Z
null
['CVE-2022-1091']
Cross site scripting in safe-svg
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'darylldoyle/safe-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1091'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/commit/00cb9a86d1bff2214714557d1901ec3896564e50'}, {'type': 'PACKAGE', 'url': 'https://github.com/10up/safe-svg'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:15:03Z', 'nvd_published_at': '2022-04-18T18:15:00Z'}
1.4.0
GHSA-7gc6-qh9x-w6h8
2022-04-28T20:45:25Z
2022-04-17T00:00:32Z
null
['CVE-2022-1365']
Incorrect Authorization in cross-fetch
When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty. Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with provided cookie .
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/pull/135'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lquixada/cross-fetch'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac'}]
{'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:45:25Z', 'nvd_published_at': '2022-04-15T23:15:00Z'}
1.4.0
GHSA-rqrc-8q8f-cp9c
2022-04-08T18:11:51Z
2022-04-08T18:11:51Z
null
['CVE-2020-1469']
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Bond.Core.CSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/bond/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1'}]
{'cwe_ids': ['CWE-434', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T18:11:51Z', 'nvd_published_at': None}
1.4.0
GHSA-5v4m-c73v-c7gq
2022-04-12T21:23:43Z
2022-04-12T21:23:43Z
null
['CVE-2017-1000053']
Arbitrary Code Execution in Cookie Serialization
The default serialization used by Plug session may result in code execution in certain situations. Keep in mind, however, the session cookie is signed and this attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts. We recommend users to change their secret key base and salts if they suspect they have been leaked, regardless of this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:23:43Z', 'nvd_published_at': None}
1.4.0
GHSA-pfv6-prqm-85q8
2022-04-22T20:50:33Z
2022-04-16T00:00:26Z
null
['CVE-2022-24279']
Prototype Pollution in madlib-object-utils
The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'madlib-object-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24279'}, {'type': 'WEB', 'url': 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Qwerios/madlib-object-utils'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:50:33Z', 'nvd_published_at': '2022-04-15T20:15:00Z'}
1.4.0
GHSA-3xpw-vhmv-cw7h
2022-04-27T14:35:56Z
2022-04-26T00:00:35Z
null
['CVE-2022-25866']
Command injection in czproject/git-php
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'czproject/git-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}, {'type': 'PACKAGE', 'url': 'https://github.com/czproject/git-php'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/releases/tag/v4.0.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349'}]
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T14:35:56Z', 'nvd_published_at': '2022-04-25T17:15:00Z'}
1.4.0
GHSA-v6gp-9mmm-c6p5
2022-04-11T21:21:28Z
2022-04-11T21:21:28Z
null
[]
Out-of-bounds Write in zlib affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05. Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib - **Severity**: High - **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write - **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc36-42cf-vqwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:21:28Z', 'nvd_published_at': None}
1.4.0
GHSA-ch3h-j2vf-95pv
2023-06-07T15:35:54Z
2022-04-27T22:32:49Z
null
['CVE-2022-27777']
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact If untrusted data is passed as the hash key for tag attributes, there is a possibility that the untrusted data may not be properly escaped which can lead to an XSS vulnerability. Impacted code will look something like this: ``` check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' }) ``` Where the "malicious_input" variable contains untrusted data. All users running an affected release should either upgrade or use one of the workarounds immediately. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Escape the untrusted data before using it as a key for tag helper methods.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2022-27777.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:32:49Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-j739-gw6q-f4c7
2022-04-22T20:41:49Z
2022-04-14T00:00:19Z
null
['CVE-2020-29653']
HTML Injection in Froxlor
Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags. Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/security/advisories'}, {'type': 'WEB', 'url': 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:41:49Z', 'nvd_published_at': '2022-04-13T13:15:00Z'}
1.4.0
GHSA-6p96-vfrc-fv32
2023-07-07T19:13:30Z
2022-04-12T00:00:34Z
null
['CVE-2022-27115']
RCE in Studio-42 elFinder on Windows before 2.1.61
In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27115'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3458'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/69be51eea5b484822a29ddd40f1b72845954ba60'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:13:30Z', 'nvd_published_at': '2022-04-11T15:15:00Z'}
1.4.0
GHSA-c4r5-xvgw-2942
2023-09-25T11:33:41Z
2022-04-19T00:00:50Z
null
['CVE-2021-3503']
Metrics exposure in Wildfly
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-metrics'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.0.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/14136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c4r5-xvgw-2942'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/wildfly'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/WFLY-11933'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0004/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:02Z', 'nvd_published_at': '2022-04-18T17:15:00Z'}
1.4.0
GHSA-5cmw-fhq9-8fhh
2022-04-12T18:10:00Z
2022-04-01T00:00:40Z
null
['CVE-2022-1176']
Type Confusion in LiveHelperChat
Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3'}]
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:41:31Z', 'nvd_published_at': '2022-03-31T10:15:00Z'}
1.4.0
GHSA-gprh-7767-cw39
2022-04-22T20:18:24Z
2022-04-12T00:00:34Z
null
['CVE-2021-40219']
Code Injection in Bolt CMS
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/core'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php'}, {'type': 'WEB', 'url': 'https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219'}, {'type': 'WEB', 'url': 'http://boltcms.com'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:18:24Z', 'nvd_published_at': '2022-04-11T17:15:00Z'}
1.4.0
GHSA-p5rr-q5g6-gm42
2023-09-18T22:57:43Z
2022-04-29T03:01:19Z
null
['CVE-2004-2381']
Jetty HTTP Server Denial of Service vulnerability
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2381'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/15537'}, {'type': 'WEB', 'url': 'http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76'}, {'type': 'WEB', 'url': 'http://sourceforge.net/project/shownotes.php?release_id=224743'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/4387'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:57:43Z', 'nvd_published_at': '2004-12-31T05:00:00Z'}
1.4.0
GHSA-64fq-9c6w-rq44
2022-04-22T20:21:47Z
2022-04-09T00:00:25Z
null
['CVE-2021-43515']
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/2532'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}]
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:21:47Z', 'nvd_published_at': '2022-04-08T17:15:00Z'}
1.4.0
GHSA-g397-v4w5-4m79
2022-04-04T21:57:37Z
2022-04-02T00:00:13Z
null
['CVE-2022-21223']
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/127'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cocoapods-downloader/CVE-2022-21223.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280'}]
{'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:57:37Z', 'nvd_published_at': '2022-04-01T18:15:00Z'}
1.4.0
GHSA-c2cp-3xj9-97w9
2022-05-04T03:52:42Z
2022-04-22T00:00:33Z
null
['CVE-2022-22969']
Denial of service in Spring Security OAuth
Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22969'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:01:06Z', 'nvd_published_at': '2022-04-21T19:15:00Z'}
1.4.0
GHSA-2v7p-f4qm-r5pc
2022-05-03T21:01:41Z
2022-04-23T00:03:03Z
null
['CVE-2022-1429']
SQL Injection found in Pimcore
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T21:01:41Z', 'nvd_published_at': '2022-04-22T09:15:00Z'}
1.4.0
GHSA-f9wg-5f46-cjmw
2022-04-22T20:49:09Z
2022-04-22T20:49:09Z
null
['CVE-2022-24858']
NextAuth.js default redirect callback vulnerable to open redirects
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option: ```js // async redirect(url, baseUrl) { // v3 async redirect({ url, baseUrl }) { // v4 // Allows relative callback URLs if (url.startsWith("/")) return new URL(url, baseUrl).toString() // Allows callback URLs on the same origin else if (new URL(url).origin === baseUrl) return url return baseUrl } ``` If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/callbacks#redirect-callback'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/getting-started/upgrade-v4'}]
{'cwe_ids': ['CWE-290', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:49:09Z', 'nvd_published_at': '2022-04-19T23:15:00Z'}
1.4.0
GHSA-q58j-fmvf-9rq6
2023-05-26T21:13:22Z
2022-04-22T00:24:28Z
null
['CVE-2011-1497']
Cross site scripting in actionpack Rubygem
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1497'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/61ee3449674c591747db95f9b3472c5c3bd9e84d'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/38df020c95beca7e12f0188cb7e18f3c37789e20/actionpack/CHANGELOG'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-1497.yml'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2011/04/06/13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:04Z', 'nvd_published_at': '2021-10-19T14:15:00Z'}
1.4.0
GHSA-xxx9-3xcr-gjj3
2022-04-11T21:30:00Z
2022-04-11T21:30:00Z
null
[]
XML Injection in Xerces Java affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J - **Severity**: Medium - **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection) - **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. - **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}]
{'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:30:00Z', 'nvd_published_at': None}
1.4.0
GHSA-ghcq-472w-vf4h
2022-04-08T21:59:04Z
2022-04-08T21:59:04Z
null
['CVE-2022-24821']
Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx
### Impact Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those. ### Patches This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6. ### Workarounds There's no easy workaround for this issue, administrators should upgrade their wiki. ### References https://jira.xwiki.org/browse/XWIKI-19155 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security ML](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.4.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19155'}]
{'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:59:04Z', 'nvd_published_at': '2022-04-08T19:15:00Z'}
1.4.0
GHSA-w5m2-299g-rff5
2022-04-26T12:59:00Z
2022-04-26T12:59:00Z
null
['CVE-2022-28820']
Page Compare Reflected Cross-site Scripting (XSS) vulnerability
### Impact ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. ### Patches This issue has been resolved in 5.2.0. ### Workarounds None ### References N/A ### For more information If you have any questions or comments about this advisory open an issue in acs-aem-commons. ### Credit This issue was discovered and reported by Black Lantern Security. https://hackerone.com/reports/1466020
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28820'}, {'type': 'PACKAGE', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T12:59:00Z', 'nvd_published_at': '2022-04-21T19:15:00Z'}