schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-g36h-4jr6-qmm9
2023-05-10T00:38:15Z
2023-04-26T15:30:21Z
null
['CVE-2022-25273']
Improper input validation in Drupal core
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. Drupal 7 is not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25273'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-008'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:41:46Z', 'nvd_published_at': None}
1.4.0
GHSA-rrm6-wvj7-cwh2
2023-04-21T20:24:21Z
2023-04-21T20:24:21Z
null
['CVE-2023-30608']
sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service
### Impact The SQL parser contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS). ### Patches This issues has been fixed in sqlparse 0.4.4. ### Workarounds None. ### References This issue was discovered and reported by GHSL team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). - Commit that introduced the vulnerability: e75e35869473832a1eb67772b1adfee2db11b85a
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlparse'}, 'ecosystem_specific': {'affected_functions': ['sqlparse.keywords.SQL_REGEX', 'sqlparse.lexer.Lexer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.15'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30608'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a'}, {'type': 'PACKAGE', 'url': 'https://github.com/andialbrecht/sqlparse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2023-87.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00017.html'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:24:21Z', 'nvd_published_at': None}
1.4.0
GHSA-v5hq-cqqr-6w4g
2023-04-12T22:21:03Z
2023-04-12T18:30:37Z
null
['CVE-2023-30513']
Jenkins Kubernetes Plugin does not properly mask credentials
Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met: - The credentials are printed in build steps executing on an agent (typically inside a node block). - Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch. The following plugins are affected by this vulnerability: - Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513) - Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514) - Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515) The following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled: - Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513) - Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514) As of publication of this advisory, there is no fix available for the following plugin: - Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3910.ve59cec5e33ea'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30513'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:21:03Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-p26g-97m4-6q7c
2023-04-18T22:19:57Z
2023-04-18T22:19:57Z
null
['CVE-2023-26049']
Eclipse Jetty's cookie parsing of quoted values can exfiltrate values from other cookies
Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name `DISPLAY_LANGUAGE` and a value of `b; JSESSIONID=1337; c=d` instead of 3 separate cookies. ### Impact This has security implications because if, say, `JSESSIONID` is an `HttpOnly` cookie, and the `DISPLAY_LANGUAGE` cookie value is rendered on the page, an attacker can smuggle the `JSESSIONID` cookie into the `DISPLAY_LANGUAGE` cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server. ### Patches * 9.4.51.v20230217 - via PR #9352 * 10.0.15 - via PR #9339 * 11.0.15 - via PR #9339 ### Workarounds No workarounds ### References * https://www.rfc-editor.org/rfc/rfc2965 * https://www.rfc-editor.org/rfc/rfc6265
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.51.v20230217'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0alpha0'}, {'fixed': '12.0.0.beta0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26049'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9339'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9352'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.51.v20230217'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5507'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc2965'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc6265'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:19:57Z', 'nvd_published_at': None}
1.4.0
GHSA-6wrf-mxfj-pf5p
2023-04-05T23:15:38Z
2023-04-04T21:11:24Z
null
['CVE-2023-28842']
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate. ## Impact Encrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) should be referenced for a deeper exploration. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * In multi-node clusters, deploy a global ‘pause’ container for each encrypted overlay network, on every node. For example, use the `registry.k8s.io/pause` image and a `--mode global` service. * For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features. The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network. * If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec. For example, `iptables -A INPUT -m udp —-dport 4789 -m policy --dir in --pol none -j DROP`. ## Background * This issue was discovered while characterizing and mitigating [CVE-2023-28840](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) and [CVE-2023-28841](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237). ## Related * [CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237) * [CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '20.10.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28842'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/moby'}]
{'cwe_ids': ['CWE-420', 'CWE-636'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:11:24Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
1.4.0
GHSA-f8vr-r385-rh5r
2023-05-01T21:22:01Z
2023-04-11T15:30:30Z
null
['CVE-2023-26964']
h2 vulnerable to denial of service
Hyper is an HTTP library for Rust and h2 is an HTTP 2.0 client & server implementation for Rust. An issue was discovered in h2 v0.2.4 when processing header frames. It incorrectly processes the HTTP2 `RST_STREAM` frames by not always releasing the memory immediately upon receiving the reset frame, leading to stream stacking. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS). This issue affects users only when dealing with http2 connections.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26964'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/issues/621'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/issues/2877'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/pull/668'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0034.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:47:01Z', 'nvd_published_at': '2023-04-11T14:15:00Z'}
1.4.0
GHSA-pj76-75cm-3552
2023-05-05T20:34:09Z
2023-04-28T15:30:18Z
null
['CVE-2023-28473']
Authenication bypass
Concrete CMS (previously concrete5) before 9.2 is vulnerable to possible Auth bypass in the jobs section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28473'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:44:37Z', 'nvd_published_at': None}
1.4.0
GHSA-c23v-vqw5-52c5
2023-04-28T19:50:13Z
2023-04-19T21:30:26Z
null
['CVE-2023-29922']
PowerJob vulnerable to Incorrect Access Control via the create user/save interface.
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29922'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/585'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T19:52:30Z', 'nvd_published_at': None}
1.4.0
GHSA-mjw9-3f9f-jq2w
2023-04-28T22:05:58Z
2023-04-20T22:15:35Z
null
['CVE-2023-29522']
XWiki Platform vulnerable to code injection from view right on XWiki.ClassSheet
### Impact Any user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. For instance: `Open <xwiki-host>/xwiki/bin/view/%22%2F%7D%7D%7B%7B%2Fhtml%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=XWiki.ClassSheet&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation. ### Patches This has been patched in XWiki 14.4.8, 14.10.3 and 15.0RC1. ### Workarounds The fix is only impacting Velocity templates and page contents, so applying this [patch](https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee) is enough to fix the issue. ### References - https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee - https://jira.xwiki.org/browse/XWIKI-20456 ### For more information If you have any questions or comments about this advisory: - Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) - Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mjw9-3f9f-jq2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29522'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20456'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:15:35Z', 'nvd_published_at': None}
1.4.0
GHSA-h9h3-jx58-6hqq
2023-04-10T16:39:20Z
2023-04-02T21:30:17Z
null
['CVE-2023-28679']
Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression. This results in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'javagh.jenkins:mashup-portlets-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28679'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2813'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:39:20Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-6w4m-2xhg-2658
2023-04-26T17:39:58Z
2023-04-26T17:39:58Z
null
['CVE-2022-37454']
Buffer overflow in sponge queue functions
### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37454'}, {'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/johanns/sha3/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/tiran/pysha3/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a'}, {'type': 'WEB', 'url': 'https://github.com/johanns/sha3/commit/5f2e8118a62831911703c8753ff2435c3b5d7312'}, {'type': 'WEB', 'url': 'https://csrc.nist.gov/projects/hash-functions/sha-3-project'}, {'type': 'WEB', 'url': 'https://eprint.iacr.org/2023/331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sha3/CVE-2022-37454.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/'}, {'type': 'WEB', 'url': 'https://mouha.be/sha-3-buffer-overflow/'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=33281106'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=35050307'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-02'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5267'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5269'}]
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T17:39:58Z', 'nvd_published_at': '2022-10-21T06:15:00Z'}
1.4.0
GHSA-f6xp-59jq-r35c
2023-04-10T22:51:35Z
2023-04-04T15:30:28Z
null
['CVE-2020-19278']
Phachon mm-wiki Cross Site Request Forgery vulnerability
Cross Site Request Forgery vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via the system/user/save parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19278'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/68'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}, {'type': 'WEB', 'url': 'https://imgur.com/EABvnwz'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T22:51:35Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
1.4.0
GHSA-4h2q-84w7-4mhx
2023-04-13T16:47:25Z
2023-04-13T12:30:35Z
null
['CVE-2023-2021']
nilsteampassnet/teampass vulnerable to stored cross-site scripting (XSS)
nilsteampassnet/teampass prior to 3.0.3 is vulnerable to stored cross-site scripting (XSS) in the description parameter of a folder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2021'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/77c541a0151841d1f4ceb0a84ca391e1b526d58d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T16:47:25Z', 'nvd_published_at': '2023-04-13T12:15:00Z'}
1.4.0
GHSA-3hjg-cghv-22ww
2023-04-28T19:57:45Z
2023-04-20T22:04:49Z
null
['CVE-2023-29519']
org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection
### Impact A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. ### Patches The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. ### Workarounds The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1. ### References * https://jira.xwiki.org/browse/XWIKI-20364 * https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22ww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29519'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20364'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:04:49Z', 'nvd_published_at': None}
1.4.0
GHSA-pxvg-2qj5-37jq
2023-04-11T21:48:01Z
2023-04-11T21:48:01Z
null
[]
Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs
### Summary Nokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3. libxml2 v2.10.4 addresses the following known vulnerabilities: - [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): Hashing of empty dict strings isn't deterministic - [CVE-2023-28484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484): Fix null deref in xmlSchemaFixupComplexType - Schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.14.3`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements. ### Mitigation Upgrade to Nokogiri `>= 1.14.3`. Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.10.4` which will also address these same issues. ### Impact No public information has yet been published about the security-related issues other than the upstream commits. Examination of those changesets indicate that the more serious issues relate to libxml2 dereferencing NULL pointers and potentially segfaulting while parsing untrusted inputs. The commits can be examined at: - [[CVE-2023-29469] Hashing of empty dict strings isn't deterministic (09a2dd45) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64) - [[CVE-2023-28484] Fix null deref in xmlSchemaFixupComplexType (647e072e) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f) - [schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK (4c6922f7) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6)
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:48:01Z', 'nvd_published_at': None}
1.4.0
GHSA-32qq-m9fh-f74w
2023-04-14T20:31:15Z
2023-04-05T15:30:24Z
null
['CVE-2023-25330']
MyBatis-Plus vulnerable to SQL injection via TenantPlugin
MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.baomidou:mybatis-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.5.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25330'}, {'type': 'WEB', 'url': 'https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/baomidou/mybatis-plus'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T21:13:04Z', 'nvd_published_at': '2023-04-05T14:15:00Z'}
1.4.0
GHSA-2wjp-w7g7-h63q
2023-04-06T15:07:52Z
2023-04-05T18:30:18Z
null
['CVE-2023-1883']
thorsten/phpmyfaq vulnerable to improper access control
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to improper access control when FAQ News is marked as inactive in settings and have comments enabled, allowing comments to be posted on inactive FAQs. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1883'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:52Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}