schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qgjq-hrhg-f24h | 2023-02-03T20:39:23Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24448'] | Missing permission check in Jenkins RabbitMQ Consumer Plugin | A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rabbitmq-consumer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24448'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:19:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-88v8-v46g-6c9w | 2023-02-07T23:22:49Z | 2023-01-30T06:30:27Z | null | ['CVE-2022-25936'] | Servst vulnerable to Path Traversal | Versions of the package servst before 2.0.3 are vulnerable to Directory Traversal due to improper sanitization of the filePath variable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'servst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25936'}, {'type': 'WEB', 'url': 'https://github.com/andrepolischuk/servst/commit/f7cae5d2d7c64c86bc512e1e50614240396ef114'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrepolischuk/servst'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:11Z', 'nvd_published_at': '2023-01-30T05:15:00Z'} |
1.4.0 | GHSA-q3rm-f527-ghxj | 2023-01-23T18:52:01Z | 2023-01-14T15:30:24Z | null | ['CVE-2023-0299'] | Publify Improper Input Validation vulnerability | Improper Input Validation in GitHub repository publify/publify prior to 9.2.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0299'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/ca46da283572b4f8c0b5aa245008756c8a5fd1b1'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify_core/commit/34f6e9c98e0e3b3f9896f9676b3d6442220e2b4e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2023-0299.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T21:50:45Z', 'nvd_published_at': '2023-01-14T15:15:00Z'} |
1.4.0 | GHSA-6hg4-vp5q-47mw | 2023-01-20T23:34:05Z | 2023-01-20T23:34:05Z | null | [] | CakePHP allows direct access of prefixed controller actions | Unconventional URL paths would allow direct access to prefixed actions without setting the correct request parameters. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/056f24a77428ad35e23cab6840a72b7c25c4ccc0'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/08/06/cakephp_2_5_9_2_6_10_2_7_2_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-08-06.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.5.9'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.6.11'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.7.2'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:34:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6jmx-pv77-wm5w | 2023-02-01T09:20:27Z | 2023-01-23T00:30:26Z | null | ['CVE-2023-0435'] | Excessive Attack Surface in pyload-ng | Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev41'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0435'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/431ea6f0371d748df66b344a05ca1a8e0310cff3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d'}] | {'cwe_ids': ['CWE-1125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:40:31Z', 'nvd_published_at': '2023-01-22T22:15:00Z'} |
1.4.0 | GHSA-hcvf-pfrm-jxgf | 2023-02-02T23:17:24Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24451'] | Cisco Spark Notifier Jenkins Plugin contains Missing Authorization | A missing permission check in Jenkins Cisco Spark Notifier Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cisco-spark-notifier-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24451'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cisco-spark-notifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2803'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:17:24Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-c6rx-gxqv-vr5j | 2023-02-07T21:14:50Z | 2023-01-31T06:30:26Z | null | ['CVE-2022-21129'] | nemo-appium vulnerable to OS Command Injection | Versions of the package nemo-appium before 0.0.9 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports.setup' function.
**Note:** In order to exploit this vulnerability appium-running 0.1.3 has to be installed as one of nemo-appium dependencies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nemo-appium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21129'}, {'type': 'WEB', 'url': 'https://github.com/paypal/nemo-appium/commit/aa271d36dd5c81baae3c43aa2616c84f0ee4195f'}, {'type': 'PACKAGE', 'url': 'https://github.com/paypal/nemo-appium'}, {'type': 'WEB', 'url': 'https://github.com/paypal/nemo-appium/blob/master/index.js%23L27'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T23:47:58Z', 'nvd_published_at': '2023-01-31T05:15:00Z'} |
1.4.0 | GHSA-fxg5-wq6x-vr4w | 2023-01-24T18:56:46Z | 2023-01-14T00:30:23Z | null | ['CVE-2022-41721'] | golang.org/x/net/http2/h2c vulnerable to request smuggling attack | A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2/h2c'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20220524220425-1d687d428aca'}, {'fixed': '0.1.1-0.20221104162952-702349b0e862'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20220524220425-1d687d428aca'}, {'fixed': '0.1.1-0.20221104162952-702349b0e862'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41721'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/447396'}, {'type': 'WEB', 'url': 'https://go.dev/issue/56352'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3H3EWQXM2XL5AGBX6UL443JEJ3GQXJN/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1495'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:40:06Z', 'nvd_published_at': '2023-01-13T23:15:00Z'} |
1.4.0 | GHSA-pphf-gfrm-v32r | 2023-01-25T02:56:35Z | 2023-01-17T12:30:33Z | null | ['CVE-2022-47318'] | Code injection in ruby git | ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47318'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/602'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-git/ruby-git'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN16765254/index.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:35Z', 'nvd_published_at': '2023-01-17T10:15:00Z'} |
1.4.0 | GHSA-4x65-4fjx-r7m6 | 2023-02-03T20:39:15Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24442'] | Plaintext storage of Access Token in Jenkins GitHub Pull Request Coverage Status Plugin | Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-pr-coverage-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24442'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2767'}] | {'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:03:17Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-fgwp-pwqq-g3w4 | 2023-01-20T22:03:45Z | 2023-01-12T18:30:28Z | null | ['CVE-2023-0247'] | Bloom Uncontrolled Search Path Element vulnerability | Uncontrolled Search Path Element in GitHub repository bits-and-blooms/bloom prior to 3.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bits-and-blooms/bloom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0247'}, {'type': 'WEB', 'url': 'https://github.com/bits-and-blooms/bloom/commit/658f1393d4c52254a3d22f5f64f217405ec5fefb'}, {'type': 'PACKAGE', 'url': 'https://github.com/bits-and-blooms/bloom'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f'}] | {'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:33Z', 'nvd_published_at': '2023-01-12T17:15:00Z'} |
1.4.0 | GHSA-3chw-8jq2-w769 | 2023-02-07T23:17:55Z | 2023-01-30T00:30:34Z | null | ['CVE-2023-0572'] | Froxlor contains Unchecked Error Condition | Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0572'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/7b08a71c59430d06c1efb012a6c6448262aacdb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ab24ee2-3ff6-4248-9555-0af3e5f754ec'}] | {'cwe_ids': ['CWE-391', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:31Z', 'nvd_published_at': '2023-01-29T23:15:00Z'} |
1.4.0 | GHSA-38m2-vr6g-8c94 | 2023-01-13T17:15:49Z | 2023-01-09T12:30:18Z | null | ['CVE-2022-46769'] | Apache Sling App CMS vulnerable to reflected Cross-site Scripting | An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.2 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in the site group feature. Upgrade to Apache Sling App CMS >= 1.1.4 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46769'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-app-cms'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:58:35Z', 'nvd_published_at': '2023-01-09T11:15:00Z'} |
1.4.0 | GHSA-qxxc-7mq4-mf79 | 2023-01-20T22:03:35Z | 2023-01-12T06:30:24Z | null | ['CVE-2022-24913'] | Java Merge-sort Insecure Temporary File vulnerability | Versions of the package `com.fasterxml.util:java-merge-sort` before 1.1.0 are vulnerable to Insecure Temporary File in the `StdTempFileProvider()` function in `StdTempFileProvider.java`, which uses the permissive `File.createTempFile()` function, exposing temporary file contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.util:java-merge-sort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24913'}, {'type': 'WEB', 'url': 'https://github.com/cowtowncoder/java-merge-sort/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/cowtowncoder/java-merge-sort/commit/450fdee70b5f181c2afc5d817f293efa1a543902'}, {'type': 'PACKAGE', 'url': 'https://github.com/cowtowncoder/java-merge-sort'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLUTIL-3227926'}] | {'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:55:23Z', 'nvd_published_at': '2023-01-12T05:15:00Z'} |
1.4.0 | GHSA-c9pw-f4wp-22jr | 2023-01-12T23:41:02Z | 2023-01-08T12:30:24Z | null | ['CVE-2015-10030'] | SUKOHI Surpass Path Traversal vulnerability | A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file `src/Sukohi/Surpass/Surpass.php`. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 can address this issue. The name of the patch is d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sukohi/surpass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10030'}, {'type': 'WEB', 'url': 'https://github.com/SUKOHI/Surpass/commit/d22337d453a2a14194cdb02bf12cdf9d9f827aa7'}, {'type': 'PACKAGE', 'url': 'https://github.com/SUKOHI/Surpass'}, {'type': 'WEB', 'url': 'https://github.com/SUKOHI/Surpass/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217642'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217642'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:02Z', 'nvd_published_at': '2023-01-08T10:15:00Z'} |
1.4.0 | GHSA-5pq7-52mg-hr42 | 2023-01-03T13:36:46Z | 2023-01-03T13:36:46Z | null | [] | httparty has multipart/form-data request tampering vulnerability | ### Impact
I found "multipart/form-data request tampering vulnerability" caused by Content-Disposition "filename" lack of escaping in httparty.
`httparty/lib/httparty/request` > `body.rb` > `def generate_multipart`
https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
By exploiting this problem, the following attacks are possible
* An attack that rewrites the "name" field according to the crafted file name, impersonating (overwriting) another field.
* Attacks that rewrite the filename extension at the time multipart/form-data is generated by tampering with the filename
For example, this vulnerability can be exploited to generate the following Content-Disposition.
> Normal Request example:
> normal input filename: `abc.txt`
>
> generated normal header in multipart/form-data
> `Content-Disposition: form-data; name="avatar"; filename="abc.txt"`
> Malicious Request example
> malicious input filename: `overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt`
>
> generated malicious header in multipart/form-data:
> `Content-Disposition: form-data; name="avatar"; filename="overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt"`
The Abused Header has multiple name ( `avatar` & `foo` ) fields and the "filename" has been rewritten from `*.txt` to `*.sh` .
These problems can result in successful or unsuccessful attacks, depending on the behavior of the parser receiving the request.
I have confirmed that the attack succeeds, at least in the following frameworks
* Spring (Java)
* Ktor (Kotlin)
* Ruby on Rails (Ruby)
The cause of this problem is the lack of escaping of the `"` (Double-Quote) character in Content-Disposition > filename.
WhatWG's HTML spec has an escaping requirement.
https://html.spec.whatwg.org/#multipart-form-data
> For field names and filenames for file fields, the result of the encoding in the previous bullet point must be escaped by replacing any 0x0A (LF) bytes with the byte sequence `%0A`, 0x0D (CR) with `%0D` and 0x22 (") with `%22`. The user agent must not perform any other escapes.
### Patches
As noted at the beginning of this section, encoding must be done as described in the HTML Spec.
https://html.spec.whatwg.org/#multipart-form-data
> For field names and filenames for file fields, the result of the encoding in the previous bullet point must be escaped by replacing any 0x0A (LF) bytes with the byte sequence `%0A`, 0x0D (CR) with `%0D` and 0x22 (") with `%22`. The user agent must not perform any other escapes.
Therefore, it is recommended that Content-Disposition be modified by either of the following
> Before:
> `Content-Disposition: attachment;filename="malicious.sh";dummy=.txt`
> After:
> `Content-Disposition: attachment;filename="%22malicious.sh%22;dummy=.txt"`
https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
```
file_name.gsub('"', '%22')
```
Also, as for `\r`, `\n`, URL Encode is not done, but it is not newlines, so it seemed to be OK.
However, since there may be omissions, it is safer to URL encode these as well, if possible.
( `\r` to `%0A` and `\d` to `%0D` )
### PoC
#### PoC Environment
OS: macOS Monterey(12.3)
Ruby ver: ruby 3.1.2p20
httparty ver: 0.20.0
(Python3 - HTTP Request Logging Server)
### PoC procedure
(Linux or MacOS is required.
This is because Windows does not allow file names containing `"` (double-quote) .)
1. Create Project
```
$ mkdir my-app
$ cd my-app
$ gem install httparty
```
2. Create malicious file
```
$ touch 'overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt'
```
3. Generate Vuln code
```
$ vi example.rb
```
```
require 'httparty'
filename = 'overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt'
HTTParty.post('http://localhost:12345/',
body: {
name: 'Foo Bar',
email: 'example@email.com',
avatar: File.open(filename)
}
)
```
4. Run Logging Server
I write Python code, but any method will work as long as you can see the HTTP Request Body.
(e.g. Debugger, HTTP Logging Server, Packet Capture)
$ vi logging.py
```
from http.server import HTTPServer
from http.server import BaseHTTPRequestHandler
class LoggingServer(BaseHTTPRequestHandler):
def do_POST(self):
self.send_response(200)
self.end_headers()
self.wfile.write("ok".encode("utf-8"))
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print("POST request,\nPath: %s\nHeaders:\n%s\n\nBody:\n%s\n",
str(self.path), str(self.headers), post_data.decode('utf-8'))
self.wfile.write("POST request for {}".format(self.path).encode('utf-8'))
ip = '127.0.0.1'
port = 12345
server = HTTPServer((ip, port), LoggingServer)
server.serve_forever()
```
$ python logging.py
5. Run & Logging server
```
$ run example.rb
```
Return Request Header & Body:
> User-Agent: Ruby
> Content-Type: multipart/form-data; boundary=------------------------F857UcxRc2J1zFOz
> Connection: close
> Host: localhost:12345
> Content-Length: 457
>
> --------------------------F857UcxRc2J1zFOz
> Content-Disposition: form-data; name="name"
>
> Foo Bar
> --------------------------F857UcxRc2J1zFOz
> Content-Disposition: form-data; name="email"
>
> example@email.com
> --------------------------F857UcxRc2J1zFOz
> Content-Disposition: form-data; name="avatar"; filename="overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt"
> Content-Type: text/plain
>
> abc
> --------------------------F857UcxRc2J1zFOz--
Content-Disposition:
> Content-Disposition: form-data; name="avatar"; filename="overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt"
* name fields is duplicate (avator & foo)
* filename & extension tampering ( .txt --> .sh )
### References
1. I also include a similar report that I previously reported to Firefox.
https://bugzilla.mozilla.org/show_bug.cgi?id=1556711
2. I will post some examples of frameworks that did not have problems as reference.
Golang
https://github.com/golang/go/blob/e0e0c8fe9881bbbfe689ad94ca5dddbb252e4233/src/mime/multipart/writer.go#L144
Spring
https://github.com/spring-projects/spring-framework/blob/4cc91e46b210b4e4e7ed182f93994511391b54ed/spring-web/src/main/java/org/springframework/http/ContentDisposition.java#L259-L267
Symphony
https://github.com/symfony/symfony/blob/123b1651c4a7e219ba59074441badfac65525efe/src/Symfony/Component/Mime/Header/ParameterizedHeader.php#L128-L133
### For more information
If you have any questions or comments about this advisory:
* Email us at [kumagoro_alice@yahoo.co.jp](mailto:kumagoro_alice@yahoo.co.jp)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/httparty'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43'}] | {'cwe_ids': ['CWE-472'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T13:36:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-54jw-jqr9-6cj9 | 2023-02-03T20:29:11Z | 2023-01-26T21:30:25Z | null | ['CVE-2022-25962'] | Command injection in vagrant.js | All versions of the package vagrant.js are vulnerable to Command Injection via the boxAdd function due to improper input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'vagrant.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25962'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakecatz/vagrant.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:07:48Z', 'nvd_published_at': '2023-01-26T21:15:00Z'} |
1.4.0 | GHSA-jgh8-vchw-q3g7 | 2023-02-02T18:27:22Z | 2023-01-27T01:04:27Z | null | ['CVE-2023-24622'] | safeurl-python contains Server-Side Request Forgery | ### Description
In SafeURL it is possible to specify a list of domains that should be matched before a request is sent out. The regex used to compare domains did not work as intended.
### Impact
The regex used was:
`re.match("(?i)^%s" % domain, value)`
This has two problems, first that only the beginning and not the end of the string is anchored. Second, that a dot in the domain matches any character as part of regex syntax.
Therefore, an allowlist of ["victim.com"] could allow the domain "victimacomattacker.com" to be requested.
This has lower impact since the usual attacker aim in an SSRF is to request internal resources such as private IP addresses rather than an attacker's own domain. But, in a case where SafeURL had specifically been used to try to limit requests to a particular allowlist, say for example a PDF renderer, the finding would be more severe.
### Patches
Fixed in https://github.com/IncludeSecurity/safeurl-python/pull/5
### References
[Server-side request forgery (SSRF)](https://portswigger.net/web-security/ssrf) | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'safeurl-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/pull/5/commits/42dd0c8e5fc84e17e1d3578d18aaea169eece474'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7ch4-rr99-cqcw | 2023-01-23T18:42:36Z | 2023-01-11T18:27:15Z | null | ['CVE-2023-22491'] | gatsby-transformer-remark has possible unsanitized JavaScript code injection | ### Impact
The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server.
To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. The following payload demonstrates a vulnerable configuration:
```
---js
((require("child_process")).execSync("id >> /tmp/rce"))
---
```
### Patches
A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. The patch introduces a new option, `JSFrontmatterEngine` which is set to `false` by default. When setting `JSFrontmatterEngine` to `true`, input passed to `gatsby-plugin-mdx` must be sanitized before processing to avoid a security risk. Warnings are displayed when enabling `JSFrontmatterEngine` to `true` or if it appears that the MarkdownRemark input is attempting to use the Frontmatter engine.
### Workarounds
If an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing.
**We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.**
### For more information
Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gatsby-transformer-remark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-transformer-remark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.25.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22491'}, {'type': 'PACKAGE', 'url': 'https://github.com/gatsbyjs/gatsby'}] | {'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:27:15Z', 'nvd_published_at': '2023-01-13T19:15:00Z'} |
1.4.0 | GHSA-px2f-cqrf-f2qg | 2023-02-03T20:35:34Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24452'] | CSRF vulnerability in Jenkins TestQuality Updater Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:testquality-updater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24452'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:59:08Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-6hw7-x86v-wrgf | 2023-02-02T17:31:58Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24450'] | Passwords stored in plain text by Jenkins view-cloner Plugin | Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:view-cloner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24450'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/view-cloner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787'}] | {'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:28:47Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-8v4j-7jgf-5rg9 | 2023-03-31T00:06:08Z | 2023-01-31T23:33:47Z | null | [] | Warp vulnerable to Path Traversal via Improper validation of Windows paths | Path resolution in `warp::filters::fs::dir` didn't correctly validate Windows paths meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem.
This only impacts Windows. Linux and other unix likes are not impacted by this.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'warp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/issues/937'}, {'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/pull/997'}, {'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/commit/0074a0a3e98786509259bfe3821d3b3f094257aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/seanmonstar/warp'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0082.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T23:33:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5j2g-3ph4-rgvm | 2023-02-07T21:18:11Z | 2023-01-27T00:56:39Z | null | ['CVE-2021-41144'] | Fix for authenticated remote code execution through layout update | ### Impact
A layout block was able to bypass the block blacklist to execute remote code.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41144'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:39Z', 'nvd_published_at': '2023-01-27T19:15:00Z'} |
1.4.0 | GHSA-g3pv-pj5f-3hfq | 2023-01-20T23:35:49Z | 2023-01-18T00:30:18Z | null | ['CVE-2021-32837'] | mechanize Regular Expression Denial of Service vulnerability | mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mechanize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32837'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-mechanize/mechanize'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:35:49Z', 'nvd_published_at': '2023-01-17T22:15:00Z'} |
1.4.0 | GHSA-3cm8-v4mc-gppg | 2023-09-20T21:09:18Z | 2023-01-26T21:30:20Z | null | ['CVE-2022-4510'] | Path traversal in binwalk | A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 inclusive. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through and including 2.3.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'binwalk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.2b'}, {'last_affected': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4510'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/pull/617'}, {'type': 'PACKAGE', 'url': 'https://github.com/ReFirmLabs/binwalk'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-07'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T20:53:49Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-vp62-m958-qj8c | 2023-01-23T22:17:59Z | 2023-01-04T00:30:26Z | null | ['CVE-2022-38723'] | Gravitee API Management contains Path Traversal | **This CVE addresses the partial fix for CVE-2019-25075**
Gravitee API Management before 3.15.13 allows path traversal through HTML injection. A certain HTML injection combined with path traversal in the Email service in Gravitee API Management before 3.15.13 allows anonymous users to read arbitrary files via a /management/users/register request.
A patch was published in 2019 for this vulnerability but did not appear to have solved the issue. Version 3.15.13 did remove the flaw. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.gravitee.apim:gravitee-api-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38723'}, {'type': 'WEB', 'url': 'https://community.gravitee.io/t/whats-new-in-access-management-3-15-lts/164'}, {'type': 'WEB', 'url': 'https://gist.github.com/garatc/d86cdb1fa2e35a7ee719d9a0de0b5ca3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xc4w-28g8-vqm5'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitee-io/gravitee-api-management'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:21:33Z', 'nvd_published_at': '2023-01-03T22:15:00Z'} |
1.4.0 | GHSA-7h75-hwxx-qpgc | 2023-02-08T21:35:25Z | 2023-01-27T00:30:19Z | null | ['CVE-2022-47951'] | OpenStack Cinder, glance, and Nova vulnerable to Path Traversal | An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'cinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0.0'}, {'fixed': '25.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47951'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1996188'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00041.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00042.html'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2023-002.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5336'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5337'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5338'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:35:25Z', 'nvd_published_at': '2023-01-26T22:15:00Z'} |
1.4.0 | GHSA-6g33-8w2q-4hxv | 2023-01-11T23:01:14Z | 2023-01-05T12:30:27Z | null | ['CVE-2021-4305'] | robots-txt-guard Inefficient Regular Expression Complexity vulnerability | A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'robots-txt-guard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4305'}, {'type': 'WEB', 'url': 'https://github.com/Woorank/robots-txt-guard/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020'}, {'type': 'PACKAGE', 'url': 'https://github.com/Woorank/robots-txt-guard'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217448'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217448'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:04:05Z', 'nvd_published_at': '2023-01-05T11:15:00Z'} |
1.4.0 | GHSA-7222-r37x-8q3m | 2023-01-24T18:52:25Z | 2023-01-16T12:30:18Z | null | ['CVE-2022-43719'] | Apache Superset vulnerable to Cross-Site Request Forgery via legacy REST API endpoints | Two legacy REST API endpoints for approval and request access are vulnerable to cross site request forgery. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43719'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xc309h2dphrkg33154djf3nqlh2xc1c0'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:25:28Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-g7gf-2rqw-5rwx | 2023-02-07T15:48:13Z | 2023-01-29T18:30:31Z | null | ['CVE-2023-0569'] | Publify contains Weak Password Requirements | Weak Password Requirements in GitHub repository publify/publify prior to 9.2.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0569'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/8905e4e639cf03b758da558568a86c9816253b2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2023-0569.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9'}] | {'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T23:39:19Z', 'nvd_published_at': '2023-01-29T17:15:00Z'} |
1.4.0 | GHSA-7jf5-fvgf-48c6 | 2023-02-01T01:37:24Z | 2023-01-19T00:30:30Z | null | ['CVE-2023-0290'] | Velociraptor subject to Path Traversal | Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'www.velocidex.com/golang/velociraptor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7-5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0290'}, {'type': 'WEB', 'url': 'https://github.com/Velocidex/velociraptor/commit/4718bb0cb426564568abc77910e90a2c211a32e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Velocidex/velociraptor'}, {'type': 'WEB', 'url': 'https://github.com/Velocidex/velociraptor/compare/v0.6.7-4...v0.6.7-5'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:24Z', 'nvd_published_at': '2023-01-18T22:15:00Z'} |
1.4.0 | GHSA-rq2w-37h9-vg94 | 2023-05-30T06:44:57Z | 2023-01-03T21:30:21Z | null | ['CVE-2022-45143'] | Apache Tomcat improperly escapes input from JsonErrorReportValve | The `JsonErrorReportValve` in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 does not escape the `type`, `message` or `description` values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.83'}, {'fixed': '8.5.84'}]}], 'versions': ['8.5.83']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.40'}, {'fixed': '9.0.69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.68'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45143'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}] | {'cwe_ids': ['CWE-116', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:02:50Z', 'nvd_published_at': '2023-01-03T19:15:00Z'} |
1.4.0 | GHSA-w5mw-f2hq-5fw8 | 2023-01-19T01:00:50Z | 2023-01-11T18:30:27Z | null | ['CVE-2020-36650'] | gry vulnerable to Command Injection | A vulnerability, which was classified as critical, was found in IonicaBizau node-gry up to 5.x. This affects an unknown part. The manipulation leads to command injection. Upgrading to version 6.0.0 is able to address this issue. The name of the patch is 5108446c1e23960d65e8b973f1d9486f9f9dbd6c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218019. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36650'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/pull/22'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/commit/5108446c1e23960d65e8b973f1d9486f9f9dbd6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/IonicaBizau/node-gry'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/releases/tag/6.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218019'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218019'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T22:02:33Z', 'nvd_published_at': '2023-01-11T18:15:00Z'} |
1.4.0 | GHSA-fpmr-qmgh-42x2 | 2023-01-24T18:53:12Z | 2023-01-16T12:30:17Z | null | ['CVE-2022-43720'] | Apache Superset vulnerable to Injection | An authenticated attacker with write CSS template permissions can create a record with specific HTML tags that will not get properly escaped by the toast message displayed when a user deletes that specific CSS template record. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43720'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jts6x56kghr9mbowb653bk70pl81jp8l'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:16:43Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-6g8q-qfpv-57wp | 2023-01-25T16:09:33Z | 2023-01-20T17:30:20Z | null | ['CVE-2023-22727'] | CakePHP Database\\Query::offset() and limit() methods are vulnerable to SQL injection | ### Impact
The `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data.
### Patches
This issue has been fixed in 4.2.12, 4.3.11, 4.4.10
### Workarounds
Using CakePHP's Pagination library will mitigate this issue, as will validating or casting parameters to these methods.
### References
https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22727'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T17:30:20Z', 'nvd_published_at': '2023-01-17T21:15:00Z'} |
1.4.0 | GHSA-wr3c-g326-486c | 2023-01-09T19:45:01Z | 2023-01-09T19:45:01Z | null | ['CVE-2022-23508'] | GitOps Run allows for Kubernetes workload injection | ### Impact
A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources.
GitOps run has a local S3 bucket which it uses for synchronising files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorised access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content.
By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster.
### Patches
This vulnerability has been fixed by commits [75268c4](https://github.com/weaveworks/weave-gitops/pull/3114/commits/75268c4d2c8f7e4db22c63d76b451ba6545d117f) and [966823b](https://github.com/weaveworks/weave-gitops/pull/3102/commits/966823bbda8c539a4661e2a4f8607c9307ba6225). Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022.
### Workarounds
There is no workaround for this vulnerability.
### References
Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops)
- Email us at [support@weave.works](mailto:support@weave.works)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-wr3c-g326-486c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23508'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3102/commits/966823bbda8c539a4661e2a4f8607c9307ba6225'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3114/commits/75268c4d2c8f7e4db22c63d76b451ba6545d117f'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/weave-gitops'}] | {'cwe_ids': ['CWE-284', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:45:01Z', 'nvd_published_at': '2023-01-09T13:15:00Z'} |
1.4.0 | GHSA-89qm-wcmw-3mgg | 2023-01-09T19:45:35Z | 2023-01-09T19:45:35Z | null | ['CVE-2022-23509'] | Gitops Run insecure communication | ### Impact
GitOps run has a local S3 bucket which it uses for synchronising files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local s3 bucket is not encrypted.
This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster's resources(e.g. CVE-2022-23508).
### Patches
This vulnerability has been fixed by commits [ce2bbff](https://github.com/weaveworks/weave-gitops/pull/3106/commits/ce2bbff0a3609c33396050ed544a5a21f8d0797f) and [babd915](https://github.com/weaveworks/weave-gitops/pull/3098/commits/babd91574b99b310b84aeec9f8f895bd18acb967). Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022.
### Workarounds
There is no workaround for this vulnerability.
### References
Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops)
- Email us at [support@weave.works](mailto:support@weave.works)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-89qm-wcmw-3mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23509'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3098/commits/babd91574b99b310b84aeec9f8f895bd18acb967'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3106/commits/ce2bbff0a3609c33396050ed544a5a21f8d0797f'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/weave-gitops'}] | {'cwe_ids': ['CWE-200', 'CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:45:35Z', 'nvd_published_at': '2023-01-09T14:15:00Z'} |
1.4.0 | GHSA-3g5w-6pw7-6hrp | 2023-01-28T01:19:43Z | 2023-01-27T12:30:29Z | null | ['CVE-2022-2712'] | Path Traversal In Eclipse GlassFish | In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.main.web:web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2712'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/glassfish/pull/24077'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/580502'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:19:43Z', 'nvd_published_at': '2023-01-27T10:15:00Z'} |
1.4.0 | GHSA-xp3g-2729-rxm3 | 2023-01-24T18:05:17Z | 2023-01-16T03:30:25Z | null | ['CVE-2023-0316'] | Froxlor is vulnerable to path traversal | Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0316'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/983d9294603925018225d672795bd8b4a526f41e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244'}] | {'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T18:24:42Z', 'nvd_published_at': '2023-01-16T01:15:00Z'} |
1.4.0 | GHSA-x22v-qgm2-7qc7 | 2023-01-12T16:49:16Z | 2023-01-07T06:30:19Z | null | ['CVE-2023-0110'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0110'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6e4a1961-dbca-46f6-ae21-c25a621e54a7'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:52:55Z', 'nvd_published_at': '2023-01-07T04:15:00Z'} |
1.4.0 | GHSA-rx76-xw35-6rh8 | 2023-02-07T21:16:30Z | 2023-01-31T12:30:24Z | null | ['CVE-2022-44644'] | Apache Linkis vulnerable to Exposure of Sensitive Information | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44644'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h'}] | {'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T00:09:07Z', 'nvd_published_at': '2023-01-31T10:15:00Z'} |
1.4.0 | GHSA-pcc2-w6m8-x5w4 | 2023-02-06T16:42:09Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24429'] | Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin | Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:semantic-versioning-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24429'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin/commit/c67a89822f86a7d10498ea2783b833052b719086'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20(1)'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:00:32Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-7mg5-rw39-q67f | 2023-01-12T20:58:35Z | 2023-01-06T18:30:19Z | null | ['CVE-2014-125051'] | himiklab yii2-jqgrid-widget vulnerable to SQL Injection | A vulnerability was found in himiklab yii2-jqgrid-widget up to 1.0.7. It has been declared as critical. This vulnerability affects the function `addSearchOptionsRecursively` of the file `JqGridAction.php`. The manipulation leads to sql injection. Upgrading to version 1.0.8 can address this issue. The name of the patch is a117e0f2df729e3ff726968794d9a5ac40e660b9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217564. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'himiklab/yii2-jqgrid-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125051'}, {'type': 'WEB', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget/commit/a117e0f2df729e3ff726968794d9a5ac40e660b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget'}, {'type': 'WEB', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget/releases/tag/1.0.8'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217564'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217564'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:58:35Z', 'nvd_published_at': '2023-01-06T17:15:00Z'} |
1.4.0 | GHSA-m4f8-p58g-j8mj | 2023-01-25T02:56:52Z | 2023-01-18T00:30:18Z | null | ['CVE-2010-10006'] | Observable timing discrepancy in JOpenId | A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.expressme:JOpenId'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10006'}, {'type': 'WEB', 'url': 'https://github.com/michaelliao/jopenid/commit/c9baaa976b684637f0d5a50268e91846a7a719ab'}, {'type': 'WEB', 'url': 'https://github.com/michaelliao/jopenid/releases/tag/JOpenId-1.08'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218460'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218460'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:52Z', 'nvd_published_at': '2023-01-18T00:15:00Z'} |
1.4.0 | GHSA-m6q8-mwf6-6mmc | 2023-01-27T01:18:39Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24434'] | CSRF vulnerability in Jenkins GitHub Pull Request Builder Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.42.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24434'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20(2)'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:18:39Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-wvr2-q86m-6whp | 2023-01-12T22:47:31Z | 2023-01-07T21:30:38Z | null | ['CVE-2021-4307'] | Baobab vulnerable to Prototype Pollution | A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The name of the patch is c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'baobab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4307'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/pull/511'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/commit/c56639532a923d9a1600fb863ec7551b188b5d19'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yomguithereal/baobab'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/releases/tag/2.6.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217627'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217627'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:36Z', 'nvd_published_at': '2023-01-07T20:15:00Z'} |
1.4.0 | GHSA-mc52-jpm2-cqh6 | 2023-04-03T19:15:49Z | 2023-01-20T16:56:40Z | null | ['CVE-2023-22499'] | Deno is vulnerable to race condition via interactive permission prompt spoofing | ### Impact
Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action.
A malicious program could clear the terminal screen after permission prompt was shown and write a generic message like so:
```
// Expected prompt
⚠️ ┌ Deno requests read access to "./log.txt".
├ Requested by `Deno.open()` API
├ Run again with --allow-read to bypass this prompt.
└ Allow? [y/n] (y = yes, allow; n = no, deny) >
// Prompt that users would see
Do you want to continue?
```
This situation impacts users who use Web Worker API and relied on interactive permission prompt. The reproduction is very timing sensitive and can’t be reliably reproduced on every try.
This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers).
### Patches
The problem has been fixed in Deno v1.29.3; it is recommended all users update to this version.
### Workarounds
Run with `--no-prompt` flag to disable interactive permission prompts.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.29.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-mc52-jpm2-cqh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22499'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/17392'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}] | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:56:40Z', 'nvd_published_at': '2023-01-17T21:15:00Z'} |
1.4.0 | GHSA-65v6-3c9m-hmrp | 2023-02-02T10:32:45Z | 2023-01-26T21:30:20Z | null | ['CVE-2022-47042'] | Arbitrary file write in net.mingsoft:ms-mcms | MCMS v5.2.10 and below was discovered to contain an arbitrary file write vulnerability via the component ms/template/writeFileContent.do. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47042'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I6592F'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-h6w8-52mq-4qxc | 2023-02-07T21:16:06Z | 2023-01-31T12:30:24Z | null | ['CVE-2022-44645'] | Apache Linkis contains Deserialization of Untrusted Data | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44645'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zlcfmvt65blqc4n6fxypg6f0ns8fqfz4'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T00:09:05Z', 'nvd_published_at': '2023-01-31T10:15:00Z'} |
1.4.0 | GHSA-79x5-cv79-49rj | 2023-01-24T18:52:39Z | 2023-01-16T12:30:18Z | null | ['CVE-2022-43718'] | Apache Superset is vulnerable to Cross-Site Scripting (XSS) | Upload data forms do not correctly render user input leading to possible XSS attack vectors that can be performed by authenticated users with database connection update permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43718'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8615608jt2x7b3rmqrtngldy8pn3nz2r'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T12:09:02Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-829q-v5g8-hhxc | 2023-01-20T23:02:02Z | 2023-01-20T23:02:02Z | null | [] | CakePHP has incorrect Cross-Site Request Forgery validation | CsrfComponent fails to invalidate requests that are missing both the CSRF token, and CSRF post data. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/522ed2f1fb49b00001c1ef8815a6feda790d61dd'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/05/07/cakephp_3_0_4_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-05-07.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:02:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vq8w-x8v7-f88m | 2023-01-11T20:54:28Z | 2023-01-05T09:30:28Z | null | ['CVE-2019-25095'] | LdapCherry Cross-site Scripting vulnerbaility | A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ldapcherry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25095'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/commit/6f98076281e9452fdb1adcd1bcbb70a6f968ade9'}, {'type': 'PACKAGE', 'url': 'https://github.com/kakwa/ldapcherry'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217434'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217434'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:41Z', 'nvd_published_at': '2023-01-05T08:15:00Z'} |
1.4.0 | GHSA-q95j-488q-5q3p | 2023-01-09T20:05:31Z | 2023-01-09T20:05:31Z | null | [] | Apiman Manager API affected by Jackson denial of service vulnerability | ### Impact
Due to a vulnerability in `jackson-databind <= 2.12.6.0`, an authenticated attacker could craft an Apiman policy configuration which, when saved, may cause a denial of service on the Apiman Manager API.
This does **not** affect the Apiman Gateway.
### Patches
Upgrade to Apiman 3.0.0.Final or later.
If you are using an older version of Apiman and need to remain on that version, contact your Apiman [support provider](https://www.apiman.io/support.html) for advice/long-term support.
### Workarounds
If all users of the Apiman Manager are trusted then you may assess this is low risk, as an account is required to exploit the vulnerability.
### References
* Apiman maintainer and security contact: marc@blackparrotlabs.io
* https://nvd.nist.gov/vuln/detail/CVE-2020-36518
* https://github.com/FasterXML/jackson-databind/issues/2816 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}] | [{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-q95j-488q-5q3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:05:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7cp7-jfp6-jh4f | 2023-01-25T17:57:42Z | 2023-01-20T17:33:54Z | null | ['CVE-2023-22733'] | Shopware's log module vulnerable to Improper Output Neutralization | ### Impact
The log module contains all kind of sent mails. It is possible to see the password reset email of customers and admin users to gain probably more access.
### Patches
Update to the latest 6.4.18.1 version.
### Workarounds
- For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
- Remove from all users the log module ACL rights
- [Disable logging](https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging)
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22733'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07'}, {'type': 'WEB', 'url': 'https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}] | {'cwe_ids': ['CWE-117', 'CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T17:33:54Z', 'nvd_published_at': '2023-01-17T22:15:00Z'} |
1.4.0 | GHSA-cq4p-vp5q-4522 | 2023-02-15T18:40:09Z | 2023-01-25T19:36:57Z | null | ['CVE-2022-43757'] | Plaintext storage of sensitive data in Rancher API and cluster.management.cattle.io objects | ### Impact
This issue affects Rancher versions from 2.5.0 up to and including 2.5.16, from 2.6.0 up to and including 2.6.9 and 2.7.0. It was discovered that the security advisory CVE-2021-36782 (GHSA-g7j7-h4q8-8w2f), previously released by Rancher, missed addressing some sensitive fields, secret tokens, encryption keys, and SSH keys that were still being stored in plaintext directly on Kubernetes objects like `Clusters`.
The exposed credentials are visible in Rancher to authenticated `Cluster Owners`, `Cluster Members`, `Project Owners` and `Project Members` of that cluster on the endpoints:
- `/v1/management.cattle.io.cluster`
- `/v1/management.cattle.io.clustertemplaterevisions`
The remaining sensitive fields are now stripped from `Clusters` and other objects and moved to a `Secret` before the object is stored. The `Secret` is retrieved when the credential is needed. For objects that existed before this security fix, a one-time migration happens on startup.
The fields that have been addressed by this security fix are:
- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESGCM.Keys[].Secret`
- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESCBC.Keys[].Secret`
- `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].SecretboxConfiguration.Keys[].Secret`
- `Cluster.Spec.RancherKubernetesEngineConfig.Services.Kubelet.ExtraEnv` when containing the `AWS_SECRET_ACCESS_KEY` environment variable
- `Cluster.Spec.RancherKubernetesEngineConfig.BastionHost.SSHKey`
- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSecretAccessKey`
- `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSessionToken`
- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.ApicUserKey`
- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.KafkaClientKey`
- `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.Token`
**Important:**
- For the exposure of credentials not related to Rancher, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services.
- It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary.
### Workarounds
There is no direct mitigation besides updating Rancher to a patched version.
### Patches
Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.
After upgrading to a patched version, it is important to check for the `ACISecretsMigrated` and `RKESecretsMigrated` conditions on `Clusters` and `ClusterTemplateRevisions` to confirm when secrets have been fully migrated off of those objects, and the objects scoped within them.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-cq4p-vp5q-4522'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43757'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205295'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}] | {'cwe_ids': ['CWE-200', 'CWE-256', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:57Z', 'nvd_published_at': '2023-02-07T13:15:00Z'} |
1.4.0 | GHSA-pf38-5p22-x6h6 | 2023-01-25T22:03:48Z | 2023-01-14T03:30:21Z | null | ['CVE-2023-0297'] | Code Injection in pyload-ng | Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0297'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/7d73ba7919e594d783b3411d7ddb87885aea782d'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T22:03:48Z', 'nvd_published_at': '2023-01-14T03:15:00Z'} |
1.4.0 | GHSA-pc99-qmg4-rcff | 2023-02-03T20:47:31Z | 2023-01-20T16:00:36Z | null | ['CVE-2023-22726'] | act vulnerable to arbitrary file upload in artifact server | ### Impact
The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation.
#### Issue 1: Arbitrary file upload in artifact server (GHSL-2023-004)
The [/upload endpoint](https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2) is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open.
```
router.PUT("/upload/:runId", func(w http.ResponseWriter, req *http.Request, params httprouter.Params) {
itemPath := req.URL.Query().Get("itemPath")
runID := params.ByName("runId")
if req.Header.Get("Content-Encoding") == "gzip" {
itemPath += gzipExtension
}
filePath := fmt.Sprintf("%s/%s", runID, itemPath)
```
#### Issue 2: Arbitrary file download in artifact server (GHSL-2023-004)
The [/artifact endpoint](https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245) is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server.
```
router.GET("/artifact/*path", func(w http.ResponseWriter, req *http.Request, params httprouter.Params) {
path := params.ByName("path")[1:]
file, err := fsys.Open(path)
```
#### Proof of Concept
Below I have written a Github Action that will upload secret.txt into the folder above the specified artifact directory. The first call to curl will create the directory named 1 if it does not already exist, and the second call to curl will upload the secret.txt file to the directory above the specified artifact directory.
When testing this POC, the `--artifact-server-path` parameter must be passed to act in order to enable the artifact server.
Replace yourIPandPort with the IP and port of the server. An attacker can enumerate /proc/net/tcp in order to find the artifact server IP and port, but this is out of the scope of this report. Please let me know if you would like a copy of this script.
```
name: CI
on: push
jobs:
test:
runs-on: ubuntu-latest
steps:
- run: echo "Here are some secrets" > secret.txt
- run: curl http://<yourIPandPort>/upload/1?itemPath=secret.txt --upload-file secret.txt
- run: curl http://<yourIPandPort>/upload/1?itemPath=../../secret.txt --upload-file secret.txt
```
### Remediation
1. During implementation of [Open and OpenAtEnd for FS](https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65), please ensure to use ValidPath() to check against path traversal. See more here: https://pkg.go.dev/io/fs#FS
2. Clean the user-provided paths manually
### Patches
Version 0.2.40 contains a patch.
### Workarounds
Avoid use of artifact server with `--artifact-server-path` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nektos/act'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.39'}}] | [{'type': 'WEB', 'url': 'https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22726'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/issues/1553'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/commit/63ae215071f94569d910964bdee866d91d6e3a10'}, {'type': 'PACKAGE', 'url': 'https://github.com/nektos/act'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/releases/tag/v0.2.40'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2023-004_act/'}] | {'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:00:36Z', 'nvd_published_at': '2023-01-20T22:15:00Z'} |
1.4.0 | GHSA-8c69-r38j-rpfj | 2023-02-07T15:48:39Z | 2023-01-25T19:31:08Z | null | ['CVE-2022-43755'] | Rancher cattle-token is predictable | ### Impact
An issue was discovered in Rancher versions up to and including 2.6.9 and 2.7.0, where the `cattle-token` secret, used by the `cattle-cluster-agent`, is predictable. Even after the token is regenerated, it will have the same value. This issue is not present in Rancher 2.5 releases.
The `cattle-token` is used by Rancher's `cattle-cluster-agent` to connect to the Kubernetes API of Rancher provisioned downstream clusters. The problem occurs because the `cattle-token` secret does not use any random value in its composition, which causes it to always be regenerated with the same value. This can pose a serious problem if the token is compromised and needs to be recreated for security purposes.
The usage of the `cattle-token` by an unauthorized user allows to escalate privileges to the cluster owner of the affected downstream cluster. It does not allow access to Rancher's own local cluster (the cluster where Rancher is provisioned).
### Workarounds
In case it is not possible to promptly update to a patched version, a workaround is to use the [rotate script](https://github.com/rancherlabs/support-tools/tree/master/rotate-tokens) provided in the public security advisory [CVE-2021-36782 / GHSA-g7j7-h4q8-8w2f](https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f), which facilitates the rotation and creation of a new unique downstream cluster token.
### Patches
Patched versions include releases 2.6.10, 2.7.1 and later versions.
After upgrading to one of the patched versions, it is highly recommended to rotate the `cattle-token` in downstream clusters to guarantee that a new random token will be safely regenerated.
The procedure below can rotate the `cattle-token` and should be executed in each downstream cluster provisioned by Rancher. It is recommended to first test this process in an appropriate development/testing environment.
```shell
# Verify the current secret before rotating it
$ kubectl describe secrets cattle-token -n cattle-system
# Delete the secret
$ kubectl delete secrets cattle-token -n cattle-system
# Restart the cattle-cluster-agent deployment
$ kubectl rollout restart deployment/cattle-cluster-agent -n cattle-system
# Confirm that a new and different secret was generated
$ kubectl describe secrets cattle-token -n cattle-system
```
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-8c69-r38j-rpfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43755'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205297'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}] | {'cwe_ids': ['CWE-330', 'CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:31:08Z', 'nvd_published_at': '2023-02-07T13:15:00Z'} |
1.4.0 | GHSA-c9q3-r4rv-mjm7 | 2023-02-06T16:46:16Z | 2023-01-27T00:54:46Z | null | ['CVE-2021-39217'] | Fix for arbitrary command execution in custom layout update through blocks | ### Impact
Custom Layout enabled admin users to execute arbitrary commands via block methods.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39217'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:54:46Z', 'nvd_published_at': '2023-01-27T18:15:00Z'} |
1.4.0 | GHSA-3xh5-8hvq-rc8x | 2023-01-10T21:45:06Z | 2023-01-04T15:30:19Z | null | ['CVE-2022-45875'] | Apache DolphinScheduler vulnerable to Improper Input Validation | Apache DolphinScheduler improperly validates script alert plugin parameters and is vulnerable to remote command execution. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions. Users should upgrade to version 3.0.2 or 3.1.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45875'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r0wqzkjsoq17j6ww381kmpx3jjp9hb6r'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:35:26Z', 'nvd_published_at': '2023-01-04T15:15:00Z'} |
1.4.0 | GHSA-m95x-m25c-w9mp | 2023-01-11T23:54:47Z | 2023-01-11T23:54:47Z | null | [] | XML-RPC for PHP allows access to local files via malicious argument to the Client::send method | Abusing the `$method` argument of Client::send, it was possible to force the client to _access local files_ or _connect to undesired urls_ instead of the intended target server's url (the one used in the Client constructor).
This weakness only affects installations where all the following conditions apply, at the same time:
- the xmlrpc Client is used, ie. not xmlrpc servers
- untrusted data (eg. data from remote users) is used as value for the `$method` argument of method `Client::send()`, in conjunction with conditions which trigger usage of curl as http transport (ie. either using the https, http11 or http2 protocols, or calling `Client::setUseCurl()` beforehand)
- either have set the Clients `return_type` property to 'xml', or make the resulting Response's object `httpResponse` member, which is intended to be used for debugging purposes only, available to 3rd parties, eg. by displaying it to the end user or serializing it in some storage (note that the same data can also be accessed via magic property `Response::raw_data`, and in the Request's `httpResponse` member)
This is most likely a very uncommon usage scenario, and as such the chances of exploitation of this issue may be low.
If it is not possible to upgrade to this release of the library at this time, a proactive security measure, to avoid the Client accessing any local file on the server which hosts it, is to add the following call to your code:
$client->setCurlOptions([CURLOPT_PROTOCOLS, CURLPROTO_HTTPS|CURLPROTO_HTTP]);
Originally reported as issue #81 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-m95x-m25c-w9mp'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/81'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/commit/cf6e605e09d001ce520bfa8e7b168cfa514e663b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:54:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6c2-879r-jffh | 2023-02-08T21:56:36Z | 2023-01-31T18:30:22Z | null | ['CVE-2022-45598'] | Joplin Desktop App vulnerable to Cross-site Scripting | Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45598'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v2.9.17'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:56:36Z', 'nvd_published_at': '2023-01-31T16:15:00Z'} |
1.4.0 | GHSA-69f2-4375-qv9h | 2023-02-02T10:31:55Z | 2023-01-26T21:30:27Z | null | ['CVE-2022-21810'] | Command injection in smartctl | All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'smartctl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21810'}, {'type': 'WEB', 'url': 'https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js#23L18'}, {'type': 'WEB', 'url': 'https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:28Z', 'nvd_published_at': '2023-01-26T21:15:00Z'} |
1.4.0 | GHSA-4r2f-6fm9-2qgh | 2023-01-13T19:21:37Z | 2023-01-10T06:30:25Z | null | ['CVE-2017-20166'] | Ecto lacks a protection mechanism | Ecto 2.2.0 lacks a certain protection mechanism associated with the interaction between `is_nil` and `raise`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'ecto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20166'}, {'type': 'WEB', 'url': 'https://github.com/elixir-ecto/ecto/pull/2125'}, {'type': 'WEB', 'url': 'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xxx-fhc8-9qvq'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-ecto/ecto'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/elixir-ecto/0m4NPfg_MMU'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:16:53Z', 'nvd_published_at': '2023-01-10T06:15:00Z'} |
1.4.0 | GHSA-636f-xm5j-pj9m | 2023-01-24T18:12:17Z | 2023-01-24T18:12:17Z | null | [] | Several quadratic complexity bugs may lead to denial of service in Commonmarker | ## Impact
Several quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service.
The following vulnerabilities were addressed:
* [CVE-2023-22483](https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c)
* [CVE-2023-22484](https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r)
* [CVE-2023-22485](https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr)
* [CVE-2023-22486](https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p)
For more information, consult the release notes for version [`0.23.0.gfm.7`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.7).
## Mitigation
Users are advised to upgrade to commonmarker version [`0.23.7`](https://rubygems.org/gems/commonmarker/versions/0.23.7). | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-636f-xm5j-pj9m'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T18:12:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cf5r-3pvm-w64w | 2023-01-10T22:59:29Z | 2023-01-04T12:30:29Z | null | ['CVE-2019-25094'] | typo3-appointments vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'innologi/typo3-appointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25094'}, {'type': 'WEB', 'url': 'https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/innologi/typo3-appointments'}, {'type': 'WEB', 'url': 'https://github.com/innologi/typo3-appointments/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217353'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217353'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:59:29Z', 'nvd_published_at': '2023-01-04T10:15:00Z'} |
1.4.0 | GHSA-x347-fc9w-w7c3 | 2023-01-09T20:06:35Z | 2023-01-06T00:30:17Z | null | ['CVE-2021-32828'] | Nuxeo vulnerable to Reflected Cross-Site Scripting leading to Remote Code Execution | The Nuxeo Platform is an open source content management platform for building business applications. In version 11.5.109, the `oauth2` REST API is vulnerable to Reflected Cross-Site Scripting (XSS). This XSS can be escalated to Remote Code Execution (RCE) by levering the automation API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.nuxeo.ecm.platform:nuxeo-platform-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32828'}, {'type': 'PACKAGE', 'url': 'https://github.com/nuxeo/nuxeo'}, {'type': 'WEB', 'url': 'https://github.com/nuxeo/nuxeo/blob/master/modules/platform/nuxeo-platform-oauth/src/main/java/org/nuxeo/ecm/webengine/oauth2/OAuth2Callback.java'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-072-nuxeo'}] | {'cwe_ids': ['CWE-502', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:35Z', 'nvd_published_at': '2023-01-05T23:15:00Z'} |
1.4.0 | GHSA-34p5-jp77-fcrc | 2023-02-15T18:37:48Z | 2023-01-25T19:36:35Z | null | ['CVE-2022-43758'] | Command injection in Rancher Git package | ### Impact
An issue was discovered in Rancher from versions 2.5.0 up to and including 2.5.16, 2.6.0 up to and including 2.6.9 and 2.7.0, where a command injection vulnerability is present in the Rancher Git package. This package uses the underlying Git binary available in the Rancher container image to execute Git operations.
Specially crafted commands, when not properly disambiguated, can cause confusion when executed through Git, resulting in command injection in the underlying Rancher host.
This issue can potentially be exploited in Rancher in two ways:
1. Adding an untrusted Helm catalog, in the Catalogs menu, that contains maliciously designed repo URL configuration in Helm charts.
2. Modifying the URL configuration used to download KDM (Kontainer Driver Metadata) releases.
By default, only the Rancher admin has permission to manage both configurations for the local cluster (the cluster where Rancher is provisioned).
Note: More information about this category of issue in version control system (VCS) tools are available in Snyk's [blog post](https://snyk.io/blog/argument-injection-when-using-git-and-mercurial/).
### Workarounds
Except for only adding trusted catalogs and the KDM URL to Rancher, there is no other workaround besides updating Rancher to a patched version.
### Patches
Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.
It is also important to update to a patched version in case Rancher or its standalone Git package implementation is used as a Go library instead of the application itself. Otherwise, this vulnerability might affect your dependent code.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-34p5-jp77-fcrc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43758'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205294'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}] | {'cwe_ids': ['CWE-77', 'CWE-78', 'CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:35Z', 'nvd_published_at': '2023-02-07T13:15:00Z'} |
1.4.0 | GHSA-pfrm-4rjw-g9q5 | 2023-01-10T16:13:19Z | 2023-01-02T09:31:57Z | null | ['CVE-2021-4299'] | string-kit Inefficient Regular Expression Complexity vulnerability | A vulnerability classified as problematic was found in cronvel string-kit up to 0.12.7. This vulnerability affects the function naturalSort of the file lib/naturalSort.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. Upgrading to version 0.12.8 can address this issue. The name of the patch is 9cac4c298ee92c1695b0695951f1488884a7ca73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217180. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'string-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4299'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/string-kit/commit/9cac4c298ee92c1695b0695951f1488884a7ca73'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/string-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/string-kit/releases/tag/v0.12.8'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217180'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217180'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:27:35Z', 'nvd_published_at': '2023-01-02T08:15:00Z'} |
1.4.0 | GHSA-9jff-8xmm-mw22 | 2023-01-23T18:50:01Z | 2023-01-16T00:30:24Z | null | ['CVE-2023-0310'] | phpMyFAQ Stored Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0310'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/53099a9bcc928f5f6f7cce111c04b79a72a04142'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:02:01Z', 'nvd_published_at': '2023-01-15T22:15:00Z'} |
1.4.0 | GHSA-3w9w-9833-gcpv | 2023-02-08T22:38:31Z | 2023-01-26T19:52:50Z | null | [] | Security bug in ConvertToSinglePlane when used with untrusted content from the DDS loader | ### Impact
A memory overwrite bug was reported by a security researcher in the **ConvertToSinglePlane** method via the *texconv* command-line tool when given an invalid height for planar video textures such as NV12. This can be a potential security bug for any clients of the library who follow the same pattern.
This issue *does not* impact use of the DDS texture loader itself, only when combined with `ConvertToSinglePlane` for converting multi-planar video formats. All other functions in the library fail immediately if given images in planar formats.
### Patches
The fix to the specific area as well as general hardening can be found in [this PR](https://github.com/microsoft/DirectXTex/pull/307) and will be included in the This bug has been fixed in the January 31, 2023 or later release of DirectXTex.
### Workarounds
If your code makes use of **ConvertToSinglePlane**, you can validate that the width & height alignment requirements are met for the input image before calling the function.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'directxtex_desktop_2019'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'directxtex_desktop_win10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'directxtex_uwp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/microsoft/DirectXTex/security/advisories/GHSA-3w9w-9833-gcpv'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/DirectXTex/pull/307'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/DirectXTex'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:52:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pcvh-px2p-vmxw | 2023-01-12T16:49:37Z | 2023-01-07T06:30:20Z | null | ['CVE-2023-0107'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0107'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/0f8ce3dd1696722f951d7195ad1f88b39a5d15d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:06Z', 'nvd_published_at': '2023-01-07T04:15:00Z'} |
1.4.0 | GHSA-54w6-vxfh-fw7f | 2023-01-06T20:24:36Z | 2023-01-06T20:24:36Z | null | ['CVE-2023-22465'] | Http4s improperly parses User-Agent and Server headers | ### Impact
The `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers.
#### v0.21.x
```scala
val unsafe: Option[`User-Agent`] = req.headers.get(`User-Agent`)
```
#### v0.22.x, v0.23.x, v1.x
```scala
val unsafe: Option[`User-Agent`] = req.headers.get[`User-Agent`]
val alsoUnsafe: Option[`Server`] = req.headers.get[Server]
```
### Patches
Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38.
### Workarounds
#### Use the weakly typed header interface
##### v0.21.x
```scala
val safe: Option[Header] = req.headers.get("User-Agent".ci)
// but don't do this
val unsafe = header.map(_.parsed)
```
##### v0.22.x, v0.23.x, v1.x
```scala
val safe: Option[Header] = req.headers.get(ci"User-Agent")
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.21.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-M1'}, {'fixed': '1.0.0-M38'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22465'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T20:24:36Z', 'nvd_published_at': '2023-01-04T16:15:00Z'} |
1.4.0 | GHSA-85gf-wr67-f83w | 2023-01-24T18:54:27Z | 2023-01-16T12:30:17Z | null | ['CVE-2015-10053'] | curupira is vulnerable to SQL injection | A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The name of the patch is 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'curupira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10053'}, {'type': 'WEB', 'url': 'https://github.com/prodigasistemas/curupira/commit/93a9a77896bb66c949acb8e64bceafc74bc8c271'}, {'type': 'PACKAGE', 'url': 'https://github.com/prodigasistemas/curupira'}, {'type': 'WEB', 'url': 'https://github.com/prodigasistemas/curupira/releases/tag/v0.1.4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curupira/CVE-2015-10053.yml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218394'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218394'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T19:03:31Z', 'nvd_published_at': '2023-01-16T12:15:00Z'} |
1.4.0 | GHSA-hq7p-j377-6v63 | 2023-05-16T15:47:47Z | 2023-01-18T18:20:19Z | null | ['CVE-2023-22794'] | SQL Injection Vulnerability via ActiveRecord comments | There is a possible vulnerability in ActiveRecord related to the sanitization of comments. This vulnerability has been assigned the CVE identifier CVE-2023-22794.
Versions Affected: >= 6.0.0 Not affected: < 6.0.0 Fixed Versions: 6.0.6.1, 6.1.7.1, 7.0.4.1
Impact
Previously the implementation of escaping for comments was insufficient for
If malicious user input is passed to either the annotate query method, the optimizer_hints query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database with insufficient sanitization and be able to inject SQL outside of the comment.
In most cases these interfaces won’t be used with user input and users should avoid doing so.
Example vulnerable code:
```
Post.where(id: 1).annotate("#{params[:user_input]}")
Post.where(id: 1).optimizer_hints("#{params[:user_input]}")
```
Example vulnerable QueryLogs configuration (the default configuration is not vulnerable):
```
config.active_record.query_log_tags = [
{
something: -> { <some value including user input> }
}
]
```
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
Avoid passing user input to annotate and avoid using QueryLogs configuration which can include user input.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
6-0-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 6.0 series
6-1-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 6.1 series
7-0-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 7.0 series
Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22794'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d7aba06953f9fa789c411676b941d20df8ef73de'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2023-22794.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:20:19Z', 'nvd_published_at': '2023-02-09T20:15:00Z'} |
1.4.0 | GHSA-67w4-w877-jv29 | 2023-02-03T20:34:12Z | 2023-01-26T21:30:17Z | null | ['CVE-2023-24459'] | Missing permission check in Jenkins BearyChat Plugin | A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bearychat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24459'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:37Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-6vf6-g3pr-j83h | 2023-01-24T18:56:50Z | 2023-01-20T16:55:24Z | null | ['CVE-2023-0323'] | pimcore is vulnerable to cross-site scripting via "title field " in data objects | ### Impact
The vulnerability is capable of resulting in stolen user cookies.
#### Proof of Concept
```
Login with dev account https://11.x-dev.pimcore.fun/admin/?_dc=1670962076&perspective=
Go to setting --> data objects --> classes --> events
Click media under genaral settings
Add payload in title field.
Go to data objects module and open events, xss will trigger
// PoC.js "><iMg SrC="x" oNeRRor="alert(xss);">
```
### Patches
Update to version 10.5.14 or apply this patch manually https://github.com/pimcore/pimcore/pull/13916.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/13916.patch manually.
### References
https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343/
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-6vf6-g3pr-j83h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0323'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/13916.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/746fac1a342841624f63ab13edcd340358e1bc04'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:55:24Z', 'nvd_published_at': '2023-01-16T15:15:00Z'} |
1.4.0 | GHSA-2jpx-h8j2-g8m4 | 2023-02-03T20:46:00Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24425'] | Exposure of system-scoped Kubernetes credentials in Jenkins Kubernetes Credentials Provider Plugin | Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.cloudbees.jenkins.plugins:kubernetes-credentials-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.209.v862c6e5fb'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24425'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3022'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:39Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-rc47-6667-2j5j | 2023-02-07T21:16:56Z | 2023-01-31T06:30:26Z | null | ['CVE-2022-25881'] | http-cache-semantics vulnerable to Regular Expression Denial of Service | http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-cache-semantics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:http-cache-semantics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25881'}, {'type': 'WEB', 'url': 'https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74'}, {'type': 'PACKAGE', 'url': 'https://github.com/kornelski/http-cache-semantics'}, {'type': 'WEB', 'url': 'https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0008/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T23:48:07Z', 'nvd_published_at': '2023-01-31T05:15:00Z'} |
1.4.0 | GHSA-9wrr-4r9v-26xc | 2023-02-03T20:33:53Z | 2023-01-26T21:30:17Z | null | ['CVE-2023-24457'] | CSRF vulnerability in Jenkins Keycloak Authentication Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:keycloak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24457'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2986'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:25Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-pxqj-xrv5-qvjf | 2023-01-11T23:51:00Z | 2023-01-11T23:51:00Z | null | [] | XML-RPC for PHP's debugger vulnerable to possible XSS attack | The bundled xml-rpc debugger is susceptible to XSS attacks.
Since the debugger is not designed to be exposed to end users but only to the developers using this library, and in the default configuration it is not exposed to requests from the web, the likelihood of exploitation may be low. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-pxqj-xrv5-qvjf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:51:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-96x6-jf5w-84c5 | 2023-01-23T18:50:46Z | 2023-01-16T00:30:25Z | null | ['CVE-2023-0306'] | phpMyFAQ Stored Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0306'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1815daef61c432bb73b9dca43f03d140c94ef0c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:10:17Z', 'nvd_published_at': '2023-01-15T22:15:00Z'} |
1.4.0 | GHSA-g6pw-999w-j75m | 2023-01-20T22:41:01Z | 2023-01-20T22:41:01Z | null | [] | ELF header parsing library doesn't check for valid offset | The crate has several unsafe sections that don't perform proper pointer validation.
An example can be found in the following function:
```
fn section_header_raw(&self) -> &[ET::SectionHeader] {
let sh_off = self.elf_header().section_header_offset() as usize;
let sh_num = self.elf_header().section_header_entry_num() as usize;
unsafe {
let sh_ptr = self.content().as_ptr().add(sh_off);
from_raw_parts(sh_ptr as *const ET::SectionHeader, sh_num)
}
}
```
While this will work perfectly fine *if* the ELF header is valid, malicious or malformed input can contain a section header offset of an arbitrary size, meaning that the resultant pointer in the unsafe block can point to an artibrary address in the address space of the process.
This can result in unpredictable behaviour, and in our fuzz testing, we discovered that it's trivial to cause SIGABRT (signal 6), or SEGV (signal 11).
The function should either be marked as unsafe, with a note that the caller is responsible for providing only valid inputs, or it should ideally do the due diligence to ensure that the offset doesn't exceed the bounds of the header (and add additional checks as necessary).
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'elf_rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vincenthouyi/elf_rs/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/vincenthouyi/elf_rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0079.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:41:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-64wv-c7jw-jw2q | 2023-01-11T20:54:44Z | 2023-01-05T09:30:26Z | null | ['CVE-2021-4303'] | Xataface vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, has been found in shannah Xataface up to 2.x. Affected by this issue is the function testftp of the file install/install_form.js.php of the component Installer. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.0.0 can address this issue. The name of the patch is 94143a4299e386f33bf582139cd4702571d93bde. It is recommended to upgrade the affected component. VDB-217442 is the identifier assigned to this vulnerability. NOTE: Installer is disabled by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'xataface/xataface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4303'}, {'type': 'WEB', 'url': 'https://github.com/shannah/xataface/commit/94143a4299e386f33bf582139cd4702571d93bde'}, {'type': 'PACKAGE', 'url': 'https://github.com/shannah/xataface'}, {'type': 'WEB', 'url': 'https://github.com/shannah/xataface/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217442'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217442'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:02:37Z', 'nvd_published_at': '2023-01-05T09:15:00Z'} |
1.4.0 | GHSA-wcm6-wv95-7jw6 | 2023-02-07T21:15:37Z | 2023-01-27T00:30:18Z | null | ['CVE-2023-0488'] | Cross-site Scripting in pyload-ng | Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev42'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0488'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:15:38Z', 'nvd_published_at': '2023-01-26T22:15:00Z'} |
1.4.0 | GHSA-96jv-c7m6-q43g | 2023-02-03T20:39:50Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24446'] | Cross-site request forgery vulnerability in Jenkins OpenID Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24446'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:58Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-9f88-wg5r-947j | 2023-01-24T18:52:46Z | 2023-01-16T12:30:18Z | null | ['CVE-2022-43717'] | Apache Superset vulnerable to Cross-site Scripting | Dashboard rendering does not sufficiently sanitize the content of markdown components leading to possible XSS attack vectors that can be performed by authenticated users with create dashboard permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43717'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g6zy6vkpvkbj5mj32vmyzwol5ldtg9pl'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:16:57Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-q764-g6fm-555v | 2023-02-07T04:11:52Z | 2023-01-23T22:05:11Z | null | ['CVE-2023-23608'] | Path traversal in spotipy | ### Summary
If a malicious URI is passed to the library, the library can be tricked into performing an operation on a different API endpoint than intended.
### Details
The [code Spotipy uses to parse URIs and URLs ](https://github.com/spotipy-dev/spotipy/blob/master/spotipy/client.py#L1942) accepts user data too liberally which allows a malicious user to insert arbitrary characters into the path that is used for API requests. Because it is possible to include `..`, an attacker can redirect for example a track lookup via `spotifyApi.track()` to an arbitrary API endpoint like playlists, but this is possible for other endpoints as well.
Before the security advisory feature was enabled on GitHub, I was already in contact with Stéphane Bruckert via e-mail, and he asked me to look into a potential fix.
My recommendation is to perform stricter parsing of URLs and URIs, which I implemented in the patch included at the end of the report. If you prefer, I can also invite you to a private fork of the repository.
### Impact
The impact of this vulnerability depends heavily on what operations a client application performs when it handles a URI from a user and how it uses the responses it receives from the API.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'spotipy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.22.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23608'}, {'type': 'PACKAGE', 'url': 'https://github.com/spotipy-dev/spotipy'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T22:05:11Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-wm32-3r4m-jvcc | 2023-01-12T22:47:55Z | 2023-01-07T21:30:38Z | null | ['CVE-2017-20164'] | Symbiote Seed Open Redirect vulnerability | A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function `onBeforeSecurityLogin` of the file `code/extensions/SecurityLoginExtension.php` of the component `Login`. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 can address this issue. The name of the patch is b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-seed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20164'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-seed/commit/b065ebd82da53009d273aa7e989191f701485244'}, {'type': 'PACKAGE', 'url': 'https://github.com/symbiote/silverstripe-seed'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-seed/releases/tag/6.0.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217626'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217626'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:48Z', 'nvd_published_at': '2023-01-07T20:15:00Z'} |
1.4.0 | GHSA-fprr-rrm8-4534 | 2023-01-05T12:03:28Z | 2023-01-03T18:30:25Z | null | ['CVE-2021-32824'] | Apache Dubbo vulnerable to remote code execution via Telnet Handler | Apache Dubbo is a Java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-authorization remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected.
Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution.
Versions 2.6.10 and 2.7.10 contain fixes for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32824'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:03:28Z', 'nvd_published_at': '2023-01-03T18:15:00Z'} |
1.4.0 | GHSA-9w5j-4mwv-2wj8 | 2023-02-03T20:33:15Z | 2023-01-26T21:30:25Z | null | ['CVE-2022-25860'] | Remote code execution in simple-git | Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25860'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:01:27Z', 'nvd_published_at': '2023-01-26T21:15:00Z'} |
1.4.0 | GHSA-pgjv-jrg2-gq3v | 2023-01-11T23:47:05Z | 2023-01-11T23:47:05Z | null | [] | dompurify vulnerable to Cross-site Scripting | dompurify prior to version 2.2.2 is vulnerable to cross-site scripting when converting from SVG namespace. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'dompurify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/issues/482'}, {'type': 'PACKAGE', 'url': 'https://github.com/cure53/DOMPurify'}, {'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/releases/tag/2.2.2'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-1035544'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8m9f-c5p9-wqch | 2023-01-27T01:01:03Z | 2023-01-26T21:30:25Z | null | ['CVE-2022-25894'] | Remote Code Execution in com.bstek.uflo:uflo-core | All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.uflo:uflo-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25894'}, {'type': 'WEB', 'url': 'https://fmyyy1.github.io/2022/10/23/uflo2rce/'}, {'type': 'WEB', 'url': 'https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/uflo-core/src/main/java/com/bstek/uflo/expr/impl/ExpressionContextImpl.java#L126'}, {'type': 'WEB', 'url': 'https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/uflo-core/src/main/java/com/bstek/uflo/expr/impl/ExpressionContextImpl.java%23L126'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:01:03Z', 'nvd_published_at': '2023-01-26T21:15:00Z'} |
1.4.0 | GHSA-pp4w-9x82-6r47 | 2023-02-07T04:06:24Z | 2023-01-30T18:30:28Z | null | ['CVE-2023-24830'] | Apache IoTDB contains Improper Authentication | Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects Apache IoTDB: from 0.13.0 before 0.13.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24830'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l4fon37687jz5ohgsnz2ko9fv400915t'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:36:00Z', 'nvd_published_at': '2023-01-30T17:15:00Z'} |
1.4.0 | GHSA-mj62-m63x-mh84 | 2023-02-03T20:35:40Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24445'] | Open redirect vulnerability in Jenkins OpenID Plugin | Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24445'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2997'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:59:33Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-m3g7-wrrq-v5c8 | 2023-01-11T20:55:00Z | 2023-01-05T00:30:17Z | null | ['CVE-2023-0055'] | Pyload contains Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32. The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session. This issue is patched in version 0.5.0b3.dev32. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev32'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0055'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce'}] | {'cwe_ids': ['CWE-319', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T23:11:58Z', 'nvd_published_at': '2023-01-04T22:15:00Z'} |
1.4.0 | GHSA-95jq-24cr-pgrq | 2023-02-03T20:46:15Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24423'] | Cross-site request forgery in Jenkins Gerrit Trigger Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.38.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24423'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2137'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-p76f-wr22-4rv6 | 2023-01-20T23:35:01Z | 2023-01-20T23:35:01Z | null | [] | CakePHP vulnerable to Remote File Inclusion through View template name manipulation | CakePHP 2.x prior to 2.0.99, 2.1.99, 2.2.99, 2.3.99, 2.4.99, 2.5.99, 2.6.12, and 2.7.6 and 3.x prior to 3.0.15 and 3.1.4 is vulnerable to Remote File Inclusion through View template name manipulation. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/5e60cc5d182e6131e3fbdfdf69f49d560c9ff78b'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/11/05/cakephp_3015_314_2612_276_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-11-05.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:35:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjx4-3f3p-29v3 | 2023-01-11T20:54:03Z | 2023-01-05T09:30:27Z | null | ['CVE-2016-15010'] | django-ucamlookup Cross-site Scripting vulnerability | A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 can address this issue. The name of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-ucamlookup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15010'}, {'type': 'WEB', 'url': 'https://github.com/uisautomation/django-ucamlookup/commit/5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/uisautomation/django-ucamlookup'}, {'type': 'WEB', 'url': 'https://github.com/uisautomation/django-ucamlookup/releases/tag/1.9.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217441'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217441'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:05Z', 'nvd_published_at': '2023-01-05T09:15:00Z'} |
1.4.0 | GHSA-m9xr-8cx7-53pj | 2023-01-24T18:05:58Z | 2023-01-16T00:30:24Z | null | ['CVE-2023-0314'] | phpMyFAQ Reflected Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0314'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/3872e7eac2ddeac182fc1335cc312d1392d56f98'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:01:26Z', 'nvd_published_at': '2023-01-15T22:15:00Z'} |