schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nulllengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-77hf-23pq-2g7c
2022-11-03T22:19:38Z
2022-06-16T00:00:26Z
null
['CVE-2022-33140']
Code injection in Apache NiFi and NiFi Registry
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi.registry:nifi-registry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '1.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.16.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33140'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-33140'}]
{'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:49:10Z', 'nvd_published_at': '2022-06-15T15:15:00Z'}
1.4.0
GHSA-54px-mhwv-5v8x
2022-06-17T00:55:34Z
2022-06-11T00:00:17Z
null
['CVE-2022-24429']
Code injection via SVG file in convert-svg-core
The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24429'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/a43dffaab0f1e419d5be84e2e7356b86ffac3cf1'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:55:34Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
1.4.0
GHSA-73pr-g6jj-5hc9
2022-07-08T17:05:08Z
2022-06-29T00:00:27Z
null
['CVE-2021-3779']
Externally Controlled Reference to a Resource in Another Sphere in ruby-mysql
A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local file readable by the client (and not a "local" file on the server).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3779'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-mysql/CVE-2021-3779.yml'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/'}, {'type': 'PACKAGE', 'url': 'http://github.com/tmtm/ruby-mysql'}]
{'cwe_ids': ['CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:34Z', 'nvd_published_at': '2022-06-28T17:15:00Z'}
1.4.0
GHSA-38j3-6fm8-pfgc
2022-06-23T21:25:08Z
2022-06-15T00:00:24Z
null
['CVE-2021-40660']
Regular expression denial of service in Delight Nashorn Sandbox
An issue was discovered in Delight Nashorn Sandbox. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.javadelight:delight-nashorn-sandbox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40660'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/issues/117'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/commit/9c8c3f3afca35e4dd176c959e1c2c5514c9d3131'}, {'type': 'PACKAGE', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:14:44Z', 'nvd_published_at': '2022-06-14T14:15:00Z'}
1.4.0
GHSA-49j4-v37g-5gg2
2022-07-05T22:59:36Z
2022-06-24T00:00:31Z
null
['CVE-2022-34204']
Missing Authorization in Jenkins EasyQA Plugin
A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-958j-443g-7mm7
2022-06-02T20:50:21Z
2022-06-02T20:50:21Z
null
['CVE-2022-1884']
OS Command Injection in gogs
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All Windows installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected. ### Patches Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev. ### Workarounds [Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129). ### References https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/ ### For more information If you have any questions or comments about this advisory, please post on #6968.
[]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-958j-443g-7mm7'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6968'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6970'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/releases/tag/v0.12.8'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:50:21Z', 'nvd_published_at': None}
1.4.0
GHSA-q8v3-7h6q-g39q
2022-12-05T21:44:51Z
2022-06-24T00:00:32Z
null
['CVE-2022-34205']
Cross-Site Request Forgery in Jenkins Jianliao Notification Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jianliao-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-v78m-2q7v-fjqp
2022-07-12T21:59:11Z
2022-06-22T17:52:51Z
null
['CVE-2022-31099']
Uncontrolled Recursion in rulex
### Impact When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if - your service parses untrusted rulex expressions (expressions provided by an untrusted user), and - your service becomes unavailable when the process running rulex aborts due to a stack overflow. ### Patches The crash is fixed in version **0.4.3**. Affected users are advised to update to this version. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Open an issue in [rulex](https://github.com/rulex-rs/rulex/issues) * Email me at [ludwig.stecher@gmx.de](mailto:ludwig.stecher@gmx.de) ### Credits Credit for finding these bugs goes to - [evanrichter](https://github.com/evanrichter) - [ForAllSecure Mayhem](https://forallsecure.com/) - [cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz) and [afl.rs](https://github.com/rust-fuzz/afl.rs)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rulex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/security/advisories/GHSA-v78m-2q7v-fjqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31099'}, {'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/commit/60aa2dc03a22d69c8800fec81f99c96958a11363'}, {'type': 'PACKAGE', 'url': 'https://github.com/rulex-rs/rulex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0030.html'}]
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:52:51Z', 'nvd_published_at': '2022-06-27T23:15:00Z'}
1.4.0
GHSA-374w-gwqr-fmxg
2022-07-21T15:23:45Z
2022-06-17T21:46:14Z
null
['CVE-2022-33154']
brotkrueml/schema fails to properly encode user input for output in HTML context, leading to XSS
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33154'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/schema/CVE-2022-33154.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/schema'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-012'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:14Z', 'nvd_published_at': '2022-07-12T22:15:00Z'}
1.4.0
GHSA-72r2-rg28-47v9
2023-06-13T16:28:21Z
2022-06-16T23:44:51Z
null
[]
`read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max)
Affected versions of this crate calls a user provided `Read` implementation on an uninitialized buffer. `Read` on uninitialized buffer is defined as undefined behavior in Rust.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'bite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hinaria/bite/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinaria/bite'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0153.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:44:51Z', 'nvd_published_at': None}
1.4.0
GHSA-7v4j-8wvr-v55r
2022-06-20T18:24:00Z
2022-06-16T23:40:38Z
null
[]
`array!` macro is unsound when its length is impure constant
Affected versions of this crate did substitute the array length provided by an user at compile-time multiple times. When an impure constant expression is passed as an array length (such as a result of an impure procedural macro), this can result in the initialization of an array with uninitialized types, which in turn can allow an attacker to execute arbitrary code. The flaw was corrected in commit [d5b63f72](https://github.com/xfix/array-macro/commit/d5b63f72090f3809c21ac28f9cfd84f12559bf7d) by making sure that array length is substituted just once.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/d5b63f72090f3809c21ac28f9cfd84f12559bf7d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2022-0017.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'https://gitlab.com/KonradBorowski/array-macro/-/issues/5'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0017.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:38Z', 'nvd_published_at': None}
1.4.0
GHSA-88r9-hfj2-54hv
2022-12-05T21:56:13Z
2022-06-24T00:00:32Z
null
['CVE-2022-34198']
Cross-site Scripting in Jenkins Stash Branch Parameter Plugin
Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:StashBranchParameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34198'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/stash-branch-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-pmcv-mgcf-rvxg
2022-06-16T23:51:32Z
2022-06-16T23:51:32Z
null
[]
Non-aligned u32 read in Chacha20 encryption and decryption
The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to `std::slice::from_raw_parts_mut`, which breaks the contract and introduces undefined behavior. This affects Chacha20 encryption and decryption in crypto2.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'crypto2'}, 'ecosystem_specific': {'affected_functions': ['crypto2::streamcipher::Chacha20::decrypt_slice', 'crypto2::streamcipher::Chacha20::encrypt_slice', 'crypto2::streamcipher::xor_si512_inplace']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shadowsocks/crypto2/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowsocks/crypto2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0121.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:32Z', 'nvd_published_at': None}
1.4.0
GHSA-5hfm-g799-wjw6
2022-06-29T22:42:13Z
2022-06-21T00:00:48Z
null
['CVE-2017-20058']
Cross site scripting in Elefant CMS
A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20058'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97255'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:13Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-xwj7-29j7-rw76
2022-06-29T22:42:02Z
2022-06-21T00:00:48Z
null
['CVE-2017-20057']
Cross site scripting in Elefant CMS
A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20057'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97254'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:02Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-7v28-g2pq-ggg8
2022-08-10T22:15:39Z
2022-06-17T01:16:03Z
null
[]
Ghost vulnerable to remote code execution in locale setting change
### Impact A [vulnerability](https://www.cve.org/CVERecord?id=CVE-2022-24785) in an upstream library means an authenticated attacker can abuse locale input to execute arbitrary commands from a file that has previously been uploaded using the file upload functionality in the post editor. ### Patches Fixed in 5.2.3, all 5.x sites should update as soon as possible. Fixed in 4.48.2, all 4.x sites should update as soon as possible. ### Workarounds Patched versions of Ghost add validation to the locale input to prevent execution of arbitrary files. Updating Ghost is the quickest complete solution. As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /ghost/api/admin/settings/` endpoint, which will also disable updating settings for your site. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org) ### Credits * devx00 - https://twitter.com/devx00
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.48.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-7v28-g2pq-ggg8'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:03Z', 'nvd_published_at': None}
1.4.0
GHSA-cxcc-q839-2cw9
2023-06-13T17:06:58Z
2022-06-16T23:48:53Z
null
[]
columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec())
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (`ColumnarReadExt::read_typed_vec()`). Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'columnar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/frankmcsherry/columnar/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/frankmcsherry/columnar'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0087.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:48:53Z', 'nvd_published_at': None}
1.4.0
GHSA-52vj-mr2j-f8jh
2022-06-03T22:20:22Z
2022-06-03T00:00:58Z
null
['CVE-2020-28246']
Server-Side Template Injection in formio
A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL.
[]
[{'package': {'ecosystem': 'npm', 'name': 'formio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28246'}, {'type': 'WEB', 'url': 'https://github.com/formio/enterprise-release/blob/master/API-Server-Change-Log.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/formio/formio'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:20:22Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-f67m-9j94-qv9j
2022-06-16T23:59:29Z
2022-06-16T23:59:29Z
null
[]
Parser creates invalid uninitialized value
Affected versions of this crate called `mem::uninitialized()` in the HTTP1 parser to create values of type `httparse::Header` (from the `httparse` crate). This is unsound, since `Header` contains references and thus must be non-null. The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUninit` instead.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/pull/2545'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0022.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:29Z', 'nvd_published_at': None}
1.4.0
GHSA-qx2j-85q5-ffp8
2022-07-07T17:14:28Z
2022-06-24T00:00:32Z
null
['CVE-2022-34296']
Query predicate bypass in Zalando Skipper
In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zalando/skipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.218'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34296'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/pull/2028'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/commit/998a658ce5a68a336a98f4e63e4371e200860dfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/zalando/skipper'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/releases/tag/v0.13.218'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-pgw7-wx7w-2w33
2022-07-29T18:13:25Z
2022-06-17T01:02:29Z
null
['CVE-2022-32210']
ProxyAgent vulnerable to MITM
### Description `Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server. ### Impact This affects all use of HTTPS via HTTP proxy using **`Undici.ProxyAgent`** with Undici or Node's global `fetch`. In this case, it removes all HTTPS security from all requests sent using Undici's `ProxyAgent`, allowing trivial MitM attacks by anybody on the network path between the client and the target server (local network users, your ISP, the proxy, the target server's ISP, etc). This less seriously affects HTTPS via HTTPS proxies. When you send HTTPS via a proxy to a remote server, the proxy can freely view or modify all HTTPS traffic unexpectedly (but only the proxy). ### Patches This issue was patched in Undici v5.5.1. ### Workarounds At the time of writing, the only workaround is to not use `ProxyAgent` as a dispatcher for TLS Connections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.2'}, {'fixed': '5.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32210'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1583680'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:29Z', 'nvd_published_at': '2022-07-14T15:15:00Z'}
1.4.0
GHSA-pf6p-25r2-fx45
2022-08-12T21:03:44Z
2022-06-29T00:00:27Z
null
['CVE-2022-0085']
Server-Side Request Forgery in dompdf/dompdf
Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0085'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/bb1ef65011a14730b7cfbe73506b4bb8a03704bd'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2022-0085.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/73dbcc78-5ba9-492f-9133-13bbc9f31236'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:12:46Z', 'nvd_published_at': '2022-06-28T15:15:00Z'}
1.4.0
GHSA-xwx5-5c9g-x68x
2022-06-10T19:53:55Z
2022-06-10T19:53:55Z
null
['CVE-2022-31045']
Ill-formed headers may lead to unexpected behavior in Istio
### Impact Ill-formed headers sent to Envoy in certain configurations can lead to unexpected memory access resulting in undefined behavior or crashing. You are at most risk if you have an Istio ingress Gateway exposed to external traffic. ### Patches 1.12.8, 1.13.5, 1.14.1 ### Workarounds No. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-05) ### For more information If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31045'}, {'type': 'PACKAGE', 'url': 'https://github.com/istio/istio'}, {'type': 'WEB', 'url': 'https://istio.io/latest/news/security/istio-security-2022-05'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:55Z', 'nvd_published_at': '2022-06-09T21:15:00Z'}
1.4.0
GHSA-hmx9-jm3v-33hv
2023-06-13T17:07:52Z
2022-06-16T23:46:08Z
null
[]
InputStream::read_exact : `Read` on uninitialized buffer causes UB
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'buffoon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/carllerche/buffoon/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/carllerche/buffoon'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0154.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:46:08Z', 'nvd_published_at': None}
1.4.0
GHSA-wjh9-344g-vc49
2022-06-15T18:57:13Z
2022-06-09T00:00:24Z
null
['CVE-2022-1997']
Cross-site Scripting in RosarioSIS
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1997'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6b22c0b5b40fad891c8cf9e7eeff3e42a35c0bf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:39Z', 'nvd_published_at': '2022-06-08T14:15:00Z'}
1.4.0
GHSA-hgm9-pww2-93pc
2022-06-29T22:42:30Z
2022-06-21T00:00:48Z
null
['CVE-2017-20061']
Cross site scripting in Elefant CMS
A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20061'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97258'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:30Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-5q86-62xr-3r57
2022-06-29T21:49:09Z
2022-06-17T01:02:56Z
null
['CVE-2022-31054']
Uses of deprecated API can be used to cause DoS in user-facing endpoints
### Impact Several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. Eventsources susceptible to an out-of-memory denial-of-service attack: - AWS SNS - Bitbucket - Bitbucket - Gitlab - Slack - Storagegrid - Webhook ### Patches A patch for this vulnerability has been released in the following Argo Events version: v1.7.1 ### Credits Disclosed by [Ada Logics](https://adalogics.com/) in a security audit sponsored by CNCF and facilitated by OSTIF. ### For more information Open an issue in the [Argo Events issue tracker](https://github.com/argoproj/argo-events/issues) or [discussions](https://github.com/argoproj/argo-events/discussions) Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-events
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-events'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31054'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/issues/1946'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/pull/1966'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-events'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:56Z', 'nvd_published_at': '2022-06-13T20:15:00Z'}
1.4.0
GHSA-9hpw-r23r-xgm5
2022-06-17T00:25:46Z
2022-06-17T00:25:46Z
null
[]
Data race in `Iter` and `IterMut`
In the affected version of this crate, `{Iter, IterMut}::next` used a weaker memory ordering when loading values than what was required, exposing a potential data race when iterating over a `ThreadLocal`'s values. Crates using `Iter::next`, or `IterMut::next` are affected by this issue.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'thread_local'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Amanieu/thread_local-rs/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/thread_local-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0006.html'}]
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:25:46Z', 'nvd_published_at': None}
1.4.0
GHSA-rcxc-3w2m-mp8h
2022-06-22T21:22:42Z
2022-06-22T21:22:42Z
null
['CVE-2022-31604']
Unsafe deserialisation in the PKI implementation scheme of NVFlare
### Impact NVFLARE contains a vulnerability in its PKI implementation module, where The CA credentials are transported via pickle and no safe deserialization. The deserialization of Untrusted Data may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity. All versions before 2.1.2 are affected. CVSS Score = 9.8 [AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln-metrics%2Fcvss%2Fv3-calculator%3Fvector%3DAV%3AN%2FAC%3AL%2FPR%3AN%2FUI%3AN%2FS%3AU%2FC%3AH%2FI%3AH%2FA%3AH&data=05%7C01%7Cchesterc%40nvidia.com%7Ce9600bde16854b0b380008da4fc544f7%7C43083d15727340c1b7db39efd9ccc17a%7C0%7C0%7C637910005925574215%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5kBrXEmAbqp8R31JCH%2FG95MUly72UPVihnBwiRFmvBY%3D&reserved=0) ### Patches The patch will be included in nvflare==2.1.2 ### Workarounds Replace pickle serialization with JSON and change the code accordingly Additional information Issue Found by: Oliver Sellwood (@Nintorac)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.impl.cert.CertBuilder.initialize', 'nvflare.lighter.impl.cert.CertBuilder._build_write_cert_pair', 'nvflare.lighter.impl.cert.CertBuilder.finalize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-rcxc-3w2m-mp8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31604'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/fd018eea9dff925a765079a94c2f017920fcda67'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NVFlare'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/nvflare/PYSEC-2022-231.yaml'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:42Z', 'nvd_published_at': '2022-07-01T18:15:00Z'}
1.4.0
GHSA-77mv-4rg7-r8qv
2022-06-17T21:43:45Z
2022-06-17T21:43:45Z
null
['CVE-2022-31070']
Potential Sensitive Cookie Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy
The nestjs-proxy library did not have a way to block sensitive cookies (e.g. session cookies) from being forwarded to backend services configured by the application developer. This could have led to sensitive cookies being inadvertently exposed to such services that should not see them. The patched version now blocks cookies from being forwarded by default. However developers can configure an allow-list of cookie names by using the `allowedCookies` config setting. Further details of this feature can be found in the library's README on [Github](https://github.com/Finastra/finastra-nodejs-libs/tree/develop/libs/proxy) or [NPM](https://www.npmjs.com/package/@finastra/nestjs-proxy). ### Patches - This issue has been fixed in version 0.7.0 of `@finastra/nestjs-proxy`. - Users of `@ffdc/nestjs-proxy` are advised that this package has been deprecated and is no longer being maintained or receiving updates. Please update your package.json file to use `@finastra/nestjs-proxy` instead. ### References - https://github.com/Finastra/finastra-nodejs-libs/pull/232 - https://github.com/Finastra/finastra-nodejs-libs/blob/master/libs/proxy/README.md
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-77mv-4rg7-r8qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31070'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/232'}, {'type': 'PACKAGE', 'url': 'https://github.com/Finastra/finastra-nodejs-libs'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:43:45Z', 'nvd_published_at': '2022-06-15T19:15:00Z'}
1.4.0
GHSA-jpp7-7chh-cf67
2022-07-07T17:16:00Z
2022-06-28T00:01:01Z
null
['CVE-2022-2218']
Cross site scripting in parse-url
Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2218'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:51Z', 'nvd_published_at': '2022-06-27T13:15:00Z'}
1.4.0
GHSA-5gc4-cx9x-9c43
2022-06-20T22:01:28Z
2022-06-09T00:00:29Z
null
['CVE-2022-21122']
Code Injection in metacalc
The package metacalc before 0.0.2 is vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'metacalc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21122'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/commit/625c23d63eabfa16fc815f5832b147b08d2144bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/metarhia/metacalc'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-METACALC-2826197'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:50Z', 'nvd_published_at': '2022-06-08T09:15:00Z'}
1.4.0
GHSA-28p5-7rg4-8v99
2023-06-13T17:33:19Z
2022-06-16T23:59:12Z
null
[]
Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` )
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'gfx-auxil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gfx-rs/gfx/issues/3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/gfx-rs/gfx'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0091.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:12Z', 'nvd_published_at': None}
1.4.0
GHSA-jhqp-vf4w-rpwq
2022-06-21T22:51:05Z
2022-06-21T22:51:05Z
null
['CVE-2022-31016']
DoS through large manifest files in Argo CD
### Impact All versions of Argo CD starting with v0.7.0 are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the [repo-server](https://argo-cd.readthedocs.io/en/stable/operator-manual/architecture/#repository-server) service. The repo-server is a critical component of Argo CD, so crashing the repo-server effectively denies core Argo CD services (such as syncing Application updates). To achieve denial of service, the attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.4.1 * v2.3.5 * v2.2.10 * v2.1.16 **The patch introduces a new `reposerver.max.combined.directory.manifests.size` config parameter, which you should tune before upgrading in production.** It caps the maximum total file size of .yaml/.yml/.json files in directory-type (raw manifest) Applications. The default max is `10M` per Application. This max is designed to keep any single app from consuming more than 3G of memory in the repo-server (manifests consume more space in memory than on disk). The 300x ratio assumes a maliciously-crafted manifest file. If you only want to protect against accidental excessive memory use, it is probably safe to use a smaller ratio. If your organization uses directory-type Applications with very many manifests or very large manifests then **check the size of those manifests and tune the config parameter before deploying this change to production**. When testing, make sure to do a "hard refresh" in either the CLI or UI to test your directory-type App. That will make sure you're using the new max logic instead of relying on cached manifest responses from Redis. ### Workarounds There is no workaround besides upgrading. To mitigate the issue, carefully limit 1) who can configure repos (determined by [RBAC](https://argo-cd.readthedocs.io/en/stable/getting_started/)), 2) which repos are allowed (determined by [Project](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/) limitations), and 3) who has push access to those repos (determined by your SCM provider configuration). ### Credits Disclosed by ADA Logics in a security audit of the Argo project sponsored by CNCF and facilitated by OSTIF. Thanks to Adam Korczynski and David Korczynski for their work on the audit. ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhqp-vf4w-rpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31016'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T22:51:05Z', 'nvd_published_at': '2022-06-25T08:15:00Z'}
1.4.0
GHSA-3r95-23jp-mhvg
2022-06-24T19:55:29Z
2022-06-17T20:55:48Z
null
['CVE-2022-31048']
Cross-Site Scripting in TYPO3's Form Framework
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9) ### Problem It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above. ### Credits Thanks to Gabe Troyan who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2022-003](https://typo3.org/security/advisory/typo3-core-sa-2022-003)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31048'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31048.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31048.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-003'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:48Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
1.4.0
GHSA-q56h-x9h5-q53c
2022-06-17T21:48:55Z
2022-06-10T00:00:56Z
null
['CVE-2022-31830']
Server-Side Request Forgery in kityminder
Kity Minder v1.3.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the init function at ImageCapture.class.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'kityminder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31830'}, {'type': 'WEB', 'url': 'https://github.com/fex-team/kityminder/issues/345'}, {'type': 'PACKAGE', 'url': 'https://github.com/fex-team/kityminder'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:48:55Z', 'nvd_published_at': '2022-06-09T14:15:00Z'}
1.4.0
GHSA-gwpf-95jc-63rv
2022-06-17T01:01:48Z
2022-06-03T00:00:41Z
null
['CVE-2022-1982']
Uncontrolled Resource Consumption in Mattermost server
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1982'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/mattermost-server/pull/19988'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:48Z', 'nvd_published_at': '2022-06-02T18:15:00Z'}
1.4.0
GHSA-c7q8-m4xw-c674
2022-07-14T21:36:35Z
2022-06-29T22:09:53Z
null
['CVE-2022-24444']
Hybridsessions does not expire session id on logout
When using the hybridsessions module is used without the session-manager module installed and sessions IDs are saved to disk, unexpired SessionIDs of logged out users can still be used to make authenticated requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24444'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/hybridsessions/CVE-2022-24444.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-24444'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:53Z', 'nvd_published_at': '2022-06-28T22:15:00Z'}
1.4.0
GHSA-3885-8gqc-3wpf
2022-07-08T17:03:07Z
2022-06-14T21:57:52Z
null
['CVE-2022-30184']
Potential leak of NuGet.org API key
### Description Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0) where a nuget.org api key could leak due to an incorrect comparison with a server url. ### Affected software #### NuGet & NuGet Packages - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.2.0 version or earlier. - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.0.1 version or earlier. - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.11.1 version or earlier. - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.9.1 version or earlier. - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.7.1 version or earlier. - Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 4.9.4 version or earlier. #### .NET SDK(s) - Any .NET 6.0 application running on .NET 6.0.5 or earlier. - Any .NET 3.1 application running on .NET Core 3.1.25 or earlier. ### Patches - If you're using NuGet.exe 6.2.0 or lower, you should download and install 6.2.1 from https://dist.nuget.org/win-x86-commandline/v6.2.1/nuget.exe. - If you're using NuGet.exe 6.0.1 or lower, you should download and install 6.0.2 from https://dist.nuget.org/win-x86-commandline/v6.0.2/nuget.exe. - If you're using NuGet.exe 5.11.1 or lower, you should download and install 5.11.2 from https://dist.nuget.org/win-x86-commandline/v5.11.2/nuget.exe. - If you're using NuGet.exe 5.9.1 or lower, you should download and install 5.9.2 from https://dist.nuget.org/win-x86-commandline/v5.9.2/nuget.exe. - If you're using NuGet.exe 5.7.1 or lower, you should download and install 5.7.2 from https://dist.nuget.org/win-x86-commandline/v4.7.2/nuget.exe. - If you're using NuGet.exe 4.9.4 or lower, you should download and install 4.9.5 from https://dist.nuget.org/win-x86-commandline/v4.9.5/nuget.exe. - If you're using .NET Core 6.0, you should download and install Runtime 6.0.6 or SDK 6.0.106 (for Visual Studio 2022 v17.0) or SDK 6.0.301 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. - If you're using .NET Core 3.1, you should download and install Runtime 3.1.26 or SDK 3.1.420 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1 .NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. ### Other Details Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/62 MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30184
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-3885-8gqc-3wpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30184'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet.Client'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-14T21:57:52Z', 'nvd_published_at': '2022-06-15T22:15:00Z'}
1.4.0
GHSA-4263-q746-94mw
2022-06-20T22:35:46Z
2022-06-18T00:00:20Z
null
['CVE-2022-22138']
Uncontrolled Resource Consumption in fast-string-search
All versions of package fast-string-search are vulnerable to Denial of Service (DoS) when computations are incorrect for non-string inputs. One can cause the V8 to attempt reading from non-permitted locations and cause a segmentation fault due to the violation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22138'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367'}]
{'cwe_ids': ['CWE-400', 'CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:46Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
1.4.0
GHSA-q579-9wp9-gfp2
2023-06-13T20:10:22Z
2022-06-17T00:14:18Z
null
[]
Window can read out of bounds if Read instance returns more bytes than buffer size
`rdiff` performs a diff of two provided strings or files. As part of its reading code it uses the return value of a `Read` instance to set the length of its internal character vector. If the `Read` implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes `rdiff` APIs to return uninitialized memory in its API methods.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'rdiff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dyule/rdiff/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dyule/rdiff'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0094.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:14:18Z', 'nvd_published_at': None}
1.4.0
GHSA-6923-546p-6rrc
2022-12-05T22:16:44Z
2022-06-24T00:00:31Z
null
['CVE-2022-34189']
Cross-site Scripting in Jenkins Image Tag Parameter Plugin
Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:image-tag-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34189'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/image-tag-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:33Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-g5fm-jp9v-2432
2022-07-08T17:05:36Z
2022-06-21T20:06:36Z
null
['CVE-2022-31093']
Improper Handling of `callbackUrl` parameter in next-auth
### Impact An attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally we convert to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to our **API route handler timing out and logging in to fail**. This has been remedied in the following releases: next-auth v3 users before version 3.29.5 are impacted. (We recommend upgrading to v4, as v3 is considered unmaintained. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)) next-auth v4 users before version 4.5.0 are impacted. ### Patches We've released patches for this vulnerability in: - v3 - `3.29.5` - v4 - `4.5.0` You can do: ```sh npm i next-auth@latest ``` or ```sh yarn add next-auth@latest ``` or ```sh pnpm add next-auth@latest ``` (This will update to the latest v4 version, but you can change `latest` to `3` if you want to stay on v3. This is not recommended.) ### Workarounds If for some reason you cannot upgrade, the workaround requires you to rely on [Advanced Initialization](https://next-auth.js.org/configuration/initialization#advanced-initialization). Here is an example: **Before:** ```js // pages/api/auth/[...nextauth].js import NextAuth from "next-auth" export default NextAuth(/* your config */) ``` **After:** ```js // pages/api/auth/[...nextauth].js import NextAuth from "next-auth" function isValidHttpUrl(url) { try { return /^https?:/.test(url).protocol } catch { return false; } } export default async function handler(req, res) { if ( req.query.callbackUrl && !isValidHttpUrl(req.query.callbackUrl) ) { return res.status(500).send(''); } return await NextAuth(req, res, /* your config */) } ``` ### References This vulnerability was discovered not long after https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74 was published and is very similar in nature. Related documentation: - https://next-auth.js.org/getting-started/client#specifying-a-callbackurl - https://next-auth.js.org/configuration/callbacks#redirect-callback A test case has been added so this kind of issue will be checked before publishing. See: https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6 ### For more information If you have any concerns, we request responsible disclosure, outlined here: https://next-auth.js.org/security#reporting-a-vulnerability ### Timeline The issue was reported 2022 June 10th, a response was sent out to the reporter in less than 2 hours, and a patch was published within 3 hours.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-g5fm-jp9v-2432'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31093'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/25517b73153332d948114bacdff3b5908de91d85'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/initialization#advanced-initialization'}]
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:06:36Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
1.4.0
GHSA-x95w-qf3m-pqpx
2022-12-05T22:22:26Z
2022-06-24T00:00:31Z
null
['CVE-2022-34187']
Cross-site Scripting in Jenkins Filesystem List Parameter Plugin
Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'aendter.jenkins.plugins:filesystem-list-parameter-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34187'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/filesystem-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:22Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-jhfv-8936-g652
2022-12-05T22:18:07Z
2022-06-24T00:00:31Z
null
['CVE-2022-34188']
Cross-site Scripting in Jenkins Hidden Parameter Plugin
Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:hidden-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34188'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/hidden-parameter-plugin/commit/b1cf577b0fe6c5db1e25031a653d84dc424e6bb9#diff-4ef68932c4bd2675faf307ce8adc92598e41c5aed65cc7bf9d86cc8d41010eedR5-R6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hidden-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:25Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-342c-vcff-2ff2
2022-06-02T20:53:43Z
2022-06-02T20:53:43Z
null
[]
Login timing attack in ezsystems/ezplatform-kernel
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-342c-vcff-2ff2'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel/'}]
{'cwe_ids': ['CWE-208'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:53:43Z', 'nvd_published_at': None}
1.4.0
GHSA-pv38-mqpp-v72h
2022-12-05T22:14:30Z
2022-06-24T00:00:31Z
null
['CVE-2022-34191']
Cross-site Scripting in Jenkins NS-ND Integration Performance Publisher Plugin
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.129'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34191'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/5b6dc5957edc3eff1b7ef2c3b52264524161b734'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/6321f09aa9518eeeaeaa2f81182e1eae079dbdf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:11Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-85q9-7467-r53q
2022-06-17T21:51:45Z
2022-06-17T21:51:45Z
null
[]
XSS Vulnerability in Markdown Editor
### Impact InvenTree uses [EasyMDE](https://github.com/Ionaru/easy-markdown-editor) for displaying markdown text in various places (e.g. for the various "notes" fields associated with various models). By default, EasyMDE does not sanitize input data, and it is possible for malicious code to be injected into the markdown editor, and executed in the users browser. *Note: This malicious data must be first uploaded to the database by an authorized user, so the risk here is limited to trusted users* ### Solution The solution here is two-fold: - Enable data sanitization for the EasyMDE renderer - [#3205](https://github.com/inventree/InvenTree/pull/3205) - Enforce cleaning of all data uploaded to the database via the API - [#3204](https://github.com/inventree/InvenTree/pull/3204) *(This will be ready for the 0.8.0 release)* ### Patches - The issue is addressed in the upcoming 0.8.0 release - This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.3 release ### Workarounds There is no workaround for this issue without upgrading InvenTree to the specified version. ### References - https://huntr.dev/bounties/ab296cf5-7a3e-4f49-8f63-5b35fc707f03/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [github](http://github.com/inventree/inventree) * Email us at [security@inventree.org](mailto:security@inventree.org)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.7.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-85q9-7467-r53q'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:51:45Z', 'nvd_published_at': None}
1.4.0
GHSA-4hpr-hh77-6q9p
2022-06-17T21:03:23Z
2022-06-10T00:00:55Z
null
['CVE-2022-2036']
Cross site scripting in francoisjacquet/rosariosis
A Cross-site Scripting (XSS) vulnerability exists in in GitHub repository francoisjacquet/rosariosis prior to 9.1. HTML entities are not properly decoded from the URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2036'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6e213b17e6ac3a3961e1eabcdaba1c892844398a'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:03:23Z', 'nvd_published_at': '2022-06-09T17:15:00Z'}
1.4.0
GHSA-26qj-cr27-r5c4
2023-07-10T13:04:36Z
2022-06-15T21:24:14Z
null
['CVE-2022-31071']
Octopoller gem published with world-writable files
### Impact Version [0.2.0](https://rubygems.org/gems/octopoller/versions/0.2.0) of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. Malicious code already present and running on your machine, separate from this package, could modify the gem’s files and change its behavior during runtime. ### Patches * octopoller 0.3.0 ### Workarounds Users can use the previous version of the gem [v0.1.0](https://rubygems.org/gems/octopoller/versions/0.1.0). Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'octopoller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.3.0'}]}], 'versions': ['0.2.0']}]
[{'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/security/advisories/GHSA-26qj-cr27-r5c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31071'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/commit/abed2b8d05abe2cc3eb6bdfb34e53d465e7c7874'}, {'type': 'PACKAGE', 'url': 'https://github.com/octokit/octopoller'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/octopoller/CVE-2022-31071.yml'}]
{'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:14Z', 'nvd_published_at': '2022-06-15T23:15:00Z'}
1.4.0
GHSA-pj96-4jhv-v792
2022-06-02T20:46:30Z
2022-06-02T20:46:30Z
null
[]
Cross site scripting via cookies in gogs
### Impact There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self. ### Patches Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev. ### Workarounds No need for workarounds. ### References N/A ### For more information If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.
[]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-pj96-4jhv-v792'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6953'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:46:30Z', 'nvd_published_at': None}
1.4.0
GHSA-3jhm-87m6-x959
2022-06-25T07:12:08Z
2022-06-25T07:12:08Z
null
[]
Path traversal mitigation bypass in OctoRPKI
### Impact The existing URI path filters in OctoRPKI (version < 1.4.3) mitigating Path traversal vulnerability could be bypassed by an attacker. In case a malicious TAL file is parsed, it was possible to write files outside the base cache folder. ### Patches The issue was fixed in version 1.4.3 ### References [CVE-2021-3907](https://www.cvedetails.com/cve/CVE-2021-3907/)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.3'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:12:08Z', 'nvd_published_at': None}
1.4.0
GHSA-cxgw-r5jg-7xwq
2022-07-11T19:27:57Z
2022-06-30T00:00:29Z
null
['CVE-2022-2073']
Code injection in grav
Grav is vulnerable to Server Side Template Injection via Twig. According to a previous vulnerability report, Twig should not render dangerous functions by default, such as system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.34'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2073'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:18Z', 'nvd_published_at': '2022-06-29T19:15:00Z'}
1.4.0
GHSA-3fvg-4v2m-98jf
2022-07-05T21:25:54Z
2022-06-25T07:19:06Z
null
['CVE-2022-25898']
JWS and JWT signature validation vulnerability with special characters
### Impact Jsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. For example, even if a string of non Base64URL encoding characters such as `!@$%` or `\11` is inserted into a valid JWS or JWT signature value string, it will still be a valid JWS or JWT signature by mistake. When jsrsasign's JWS or JWT validation is used in OpenID connect or OAuth2, this vulnerability will affect to authentication or authorization. By our internal assessment, CVSS 3.1 score will be 8.6. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N ### Patches Users validate JWS or JWT signatures should upgrade to 10.5.25. ### Workarounds Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method. ### ACKNOWLEDGEMENT Thanks to Adi Malyanker and Or David for this vulnerability report. Also thanks for [Snyk security team](https://snyk.io/) for this coordination. ### References https://github.com/kjur/jsrsasign/releases/tag/10.5.25 https://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf kjur's advisories https://github.com/advisories/GHSA-3fvg-4v2m-98jf github advisories https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898 https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verifyJWT https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verify https://kjur.github.io/jsrsasign/api/symbols/global__.html#.isBase64URLDot https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWS-verification https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWT-verification https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '10.5.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25898'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.5.25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:06Z', 'nvd_published_at': '2022-07-01T20:15:00Z'}
1.4.0
GHSA-5hh2-f4h9-446g
2022-12-05T22:24:22Z
2022-06-24T00:00:31Z
null
['CVE-2022-34185']
Cross-site Scripting in Jenkins Date Parameter Plugin
Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'me.leejay.jenkins:date-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/date-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:18Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-67hm-27mx-9cg7
2022-06-23T06:44:34Z
2022-06-13T00:00:19Z
null
['CVE-2021-41641']
Link Following in Deno
Deno <=1.14.0 file sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41641'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/issues/12152'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/12554'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/d44011a69e0674acfa9c59bd7ad7f0523eb61d42'}, {'type': 'WEB', 'url': 'https://hackers.report/report/614876917a7b150012836bb8'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:44:34Z', 'nvd_published_at': '2022-06-12T13:15:00Z'}
1.4.0
GHSA-vhfw-v69p-crcw
2022-09-01T20:11:21Z
2022-06-17T21:44:58Z
null
['CVE-2022-29864']
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}]
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29864'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:58Z', 'nvd_published_at': '2022-06-16T18:15:00Z'}
1.4.0
GHSA-62wf-24c4-8r76
2022-12-06T00:12:32Z
2022-06-24T00:00:31Z
null
['CVE-2022-34170']
Cross-site Scripting vulnerability in Jenkins
Since Jenkins 2.320 and LTS 2.332.1, help icon tooltips no longer escape the feature name, effectively undoing the fix for [SECURITY-1955](https://www.jenkins.io/security/advisory/2020-08-12/#SECURITY-1955). This vulnerability is known to be exploitable by attackers with Job/Configure permission. Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the feature name in help icon tooltips is now escaped.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.332.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.346'}, {'fixed': '2.346.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34170'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}]
{'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:12:32Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-w24x-87mr-4r23
2022-06-25T07:21:52Z
2022-06-24T00:00:30Z
null
['CVE-2022-22980']
SpEL Injection in Spring Data MongoDB
A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}], 'versions': ['3.4.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22980'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22980'}]
{'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:21:52Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-67mx-jc2f-jgjm
2022-06-17T19:21:46Z
2022-06-08T22:34:21Z
null
['CVE-2022-1986']
OS Command Injection in file editor in Gogs
### Impact The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected. ### Patches File deletions are prohibited to repository's `.git` directory. Users should upgrade to 0.12.9 or the latest 0.13.0+dev. ### Workarounds N/A ### References https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/ ### For more information If you have any questions or comments about this advisory, please post on #7000.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-67mx-jc2f-jgjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1986'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/38aff73251cc46ced96dd608dab6190415032a82'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:34:21Z', 'nvd_published_at': '2022-06-09T17:15:00Z'}
1.4.0
GHSA-v6h8-5cp2-j9w4
2022-07-05T22:59:40Z
2022-06-24T00:00:31Z
null
['CVE-2022-34206']
Missing Authorization in Jenkins Jianliao Notification Plugin
A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34206'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:40Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-x9jp-4w8m-4f3c
2022-06-10T19:51:18Z
2022-06-10T19:51:18Z
null
[]
Cross Site Scripting vulnerability in django-jsonform's admin form.
### Description django-jsonform stores the raw JSON data of the db field in a hidden textarea on the admin page. However, that data was kept in the textarea after unescaping it using the `safe` template filter. This opens up possibilities for XSS attacks. This only affects the admin pages where the django-jsonform is rendered. ### Mitigation Upgrade to django-jsonform version 2.10.1 or later. ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/bhch/django-jsonform/issues). * Email the maintainer at `Bharat Chauhan <tell.bhch@gmail.com>`.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-jsonform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bhch/django-jsonform/security/advisories/GHSA-x9jp-4w8m-4f3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bhch/django-jsonform'}]
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:51:18Z', 'nvd_published_at': None}
1.4.0
GHSA-2gqg-2rg7-gh33
2022-06-15T19:47:49Z
2022-06-03T00:01:06Z
null
['CVE-2022-29711']
Cross site scripting in librenms
LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29711'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13931'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:33Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-5phc-849h-vcxg
2023-06-13T17:07:59Z
2022-06-16T23:45:49Z
null
[]
`Read` on uninitialized buffer can cause UB (impl of `ReadKVExt`)
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'bronzedb-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Hexilee/BronzeDB/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Hexilee/BronzeDB'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0084.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:45:49Z', 'nvd_published_at': None}
1.4.0
GHSA-5h75-pvq4-82c9
2022-06-23T17:49:22Z
2022-06-23T00:00:33Z
null
['CVE-2022-23080']
Server-Side Request Forgery in Directus
Directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality, which allows a low privileged user to perform internal network port scans.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.2'}, {'fixed': '9.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23080'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-23080'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:49:22Z', 'nvd_published_at': '2022-06-22T16:15:00Z'}
1.4.0
GHSA-gfg9-x6px-r7gr
2022-06-16T23:09:17Z
2022-06-16T23:09:17Z
null
[]
Library exclusively intended to obfuscate code.
This crate allows you to write safe functions with unsafe bodies without the `unsafe` keyword. The value this adds is questionable, and hides `unsafe` usages from naive analysis.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'plutonium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/mxxo/plutonium'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0011.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:09:17Z', 'nvd_published_at': None}
1.4.0
GHSA-39r3-h8q6-2phq
2022-12-05T23:25:33Z
2022-06-24T00:00:31Z
null
['CVE-2022-34178']
Reflected Cross site scripting in Jenkins Embeddable Build Status Plugin
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability. Embeddable Build Status Plugin 2.0.4 limits URLs to `http` and `https` protocols and correctly escapes the provided value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34178'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/0fc4a199506328b08dcd0aca572a2ca79ca38714'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2567'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-rq99-93c5-33f6
2022-12-05T21:43:41Z
2022-06-24T00:00:32Z
null
['CVE-2022-34209']
Cross-Site Request Forgery in Jenkins ThreadFix Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34209'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:01Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-77vq-4j66-46m5
2022-12-05T21:42:03Z
2022-06-24T00:00:32Z
null
['CVE-2022-34210']
Missing permission check in Jenkins ThreadFix Plugin
A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:02Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-mcqm-6ff4-53qx
2022-06-24T00:53:31Z
2022-06-14T00:00:38Z
null
['CVE-2022-29894']
Cross-site Scripting in Strapi
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29894'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN44550983/index.html'}, {'type': 'WEB', 'url': 'https://strapi.io/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:31Z', 'nvd_published_at': '2022-06-13T05:15:00Z'}
1.4.0
GHSA-fqx3-r75h-vc89
2022-06-07T21:07:31Z
2022-06-07T21:07:31Z
null
[]
Improperly checked IDs on itemstacks received from the client leading to server crash in PocketMine-MP
### Impact Due to a workaround for unmapped network items implemented in 4.0.0-BETA5 (8ac16345a3bc099b62c1f5cfbf3b736e621c3f76), arbitrary item IDs are able to be written into an item's NBT. The intended purpose of this is to make said unmapped network items able to be moved around the inventory without issues. This led to an exploit due to internal limits on the range that item IDs can occupy (-32768 - 32767), while the tag type used to represent the replacement IDs for unknown items is a `TAG_Int`, allowing a range from -(2^31) - 2^31 - 1. This leads to an uncaught exception which crashes the server. ### Patches 5fd685e07d61ef670584ed11a52fd5f4b99a81a7 ### Workarounds In theory this can be checked by plugins using a custom `TypeConverter`, but this is likely to be very cumbersome. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-BETA5'}, {'fixed': '4.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fqx3-r75h-vc89'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/5fd685e07d61ef670584ed11a52fd5f4b99a81a7'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/8ac16345a3bc099b62c1f5cfbf3b736e621c3f76'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:07:31Z', 'nvd_published_at': None}
1.4.0
GHSA-3pp4-64mp-9cg9
2022-06-17T00:27:30Z
2022-06-17T00:27:30Z
null
[]
Memory Safety Issue when using `patch` or `merge` on `state` and assign the result back to `state`
Affected versions of this crate maintains references to memory that might have been freed already. If affects the following two `tremor-script` language constructs: * A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression and the expression to be merged needs to reference the `event`: ``` let state = merge state of event end; ``` * A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression and the patch operations used need to reference the `event`: ``` let state = patch state of insert event.key => event.value end; ``` For constructs like this (it doesnt matter what is references in the expression to be merged or the patch operations) an optimization was applied to manipulate the target value in-place, instead of cloning it. Our `Value` struct which underpins all event data in `tremor-script`, is representing as borrowed strings `beef::Cow<'lifetime, str>` that reference the actual `Vec<u8>` the event is based upon. We keep the raw byte-array next to the event structure inside our `Event` struct as a self-referential struct, so we make sure that the structured `Value` and its references are valid across its whole lifetime. The optimization was considered safe as long as it was only possible to merge or patche `event` data or static data. When `state` was introduced to `tremor-script` a new possibility existed, to keep `Value` data around for longer than the lifetime of an event. If `event` data is merged or patched into `state` without cloning `state` first, it can still reference keys or values from the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire. ## Workaround If an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`: ``` let tmp = merge state of event end; let state = tmp ``` ## Fix The flaw was corrected in `tremor-script` version 0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'PACKAGE', 'url': 'https://github.com/tremor-rs/tremor-runtime'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0111.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:30Z', 'nvd_published_at': None}
1.4.0
GHSA-5f47-rcg5-9m24
2022-06-20T21:37:08Z
2022-06-11T00:00:18Z
null
['CVE-2022-24278']
Directory traversal in convert-svg-core
The package convert-svg-core before 0.6.4 is vulnerable to Directory Traversal due to improper sanitization of SVG tags. Exploiting this vulnerability is possible by using a specially crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24278'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/86'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/pull/87'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/2bbc498c5029238637206661dbac9e44d37d17c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:56:38Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
1.4.0
GHSA-7558-6q45-6x7m
2022-12-05T22:23:30Z
2022-06-24T00:00:31Z
null
['CVE-2022-34186']
Cross-site Scripting in Jenkins Dynamic Extended Choice Parameter Plugin
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynamic-extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:29Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-w248-ffj2-4v5q
2022-06-20T21:59:37Z
2022-06-09T23:47:23Z
null
['CVE-2022-31043']
Fix failure to strip Authorization header on HTTP downgrade
### Impact `Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the `Authorization` header being removed, only changes to the host. ### Patches Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. ### Workarounds An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together. ### References * [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx) ### For more information If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however - please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31043'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-011'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx'}]
{'cwe_ids': ['CWE-200', 'CWE-212', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:23Z', 'nvd_published_at': '2022-06-10T00:15:00Z'}
1.4.0
GHSA-pc9c-547w-hhmc
2022-12-05T21:59:40Z
2022-06-24T00:00:31Z
null
['CVE-2022-34196']
Cross-site Scripting in Jenkins REST List Parameter Plugin
Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:rest-list-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34196'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rest-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:58Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-vqpp-q5x5-qj4r
2022-12-05T21:44:20Z
2022-06-24T00:00:32Z
null
['CVE-2022-34207']
Cross-Site Request Forgery in Jenkins Beaker builder Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:39Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-rj88-4777-828h
2022-06-03T22:33:18Z
2022-06-03T00:00:58Z
null
['CVE-2021-34079']
Command injection in docker-tester
OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file.
[]
[{'package': {'ecosystem': 'npm', 'name': 'docker-tester'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34079'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4786'}, {'type': 'PACKAGE', 'url': 'https://github.com/mintzo/docker-testing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/docker-tester'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:33:18Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-j8c7-3jpq-8985
2022-06-17T19:21:49Z
2022-06-10T00:00:55Z
null
['CVE-2022-2016']
Cross-site Scripting in FacturaScripts
Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts. A patch is available on the `master` branch of the repository in commit 7b4ddb92.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.08'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2016'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/7b4ddb9269a230e2dd07c6a8d3211c9a88f4f09f'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:42Z', 'nvd_published_at': '2022-06-09T16:15:00Z'}
1.4.0
GHSA-gwp3-f7mr-qpfv
2022-06-03T22:21:32Z
2022-06-03T00:00:59Z
null
['CVE-2021-34084']
OS Command Injection in s3-uploader
OS command injection vulnerability in Turistforeningen node-s3-uploader through 2.0.3 for Node.js allows attackers to execute arbitrary commands via the metadata() function.
[]
[{'package': {'ecosystem': 'npm', 'name': 's3-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34084'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4776'}, {'type': 'PACKAGE', 'url': 'https://github.com/Turistforeningen/node-s3-uploader'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:21:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-q754-vwc4-p6qj
2022-07-08T17:05:54Z
2022-06-22T17:53:34Z
null
['CVE-2022-31057']
Authenticated Stored Cross-site Scripting in Shopware
### Impact Authenticated Stored XSS in Administration ### Patches We recommend updating to version 5.7.12. You can get the update to 5.7.12 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/de/changelog-sw5/#5-7-12 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q754-vwc4-p6qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31057'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/3e025a0a3e123f4108082645b1ced6fb548f7b6f'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022?_ga=2.237805696.1286760707.1655914110-2145019146.1655914110'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-12'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:53:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'}
1.4.0
GHSA-qfr5-wjpw-q4c4
2022-06-29T21:52:17Z
2022-06-19T00:00:21Z
null
['CVE-2021-46823']
Denial of Service in python-ldap
python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-ldap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46823'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/221507'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-ldap/python-ldap'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:36:32Z', 'nvd_published_at': '2022-06-18T16:15:00Z'}
1.4.0
GHSA-3j8f-xvm3-ffx4
2022-07-08T17:05:50Z
2022-06-29T00:00:57Z
null
['CVE-2022-0624']
Authorization Bypass in parse-path
Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0624'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-path/commit/f9ad8856a3c8ae18e1cf4caef5edbabbc42840e8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-path'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388'}]
{'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:37Z', 'nvd_published_at': '2022-06-28T09:15:00Z'}
1.4.0
GHSA-65r6-w7vr-c75r
2022-12-05T22:27:45Z
2022-06-24T00:00:31Z
null
['CVE-2022-34183']
Cross-site Scripting in Jenkins Agent Server Parameter Plugin
Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:agent-server-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34183'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T23:00:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-9grj-j43m-mjqr
2022-12-05T23:37:15Z
2022-06-24T00:00:31Z
null
['CVE-2022-34174']
Observable timing discrepancy allows determining username validity in Jenkins
In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. This allows attackers to determine the validity of attacker-specified usernames. Login attempts with an invalid username now validate a synthetic password to eliminate the timing discrepancy in Jenkins 2.356, LTS 2.332.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.334'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.332.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34174'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2566'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:37:15Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-rxhx-9fj6-6h2m
2022-06-20T18:15:47Z
2022-06-16T23:53:32Z
null
[]
enum_map macro can cause UB when `Enum` trait is incorrectly implemented
Affected versions of this crate did not properly check the length of an enum when using `enum_map!` macro, trusting user-provided length. When the `LENGTH` in the `Enum` trait does not match the array length in the `EnumArray` trait, this can result in the initialization of the enum map with uninitialized types, which in turn can allow an attacker to execute arbitrary code. This problem can only occur with a manual implementation of the Enum trait, it will never occur for enums that use `#[derive(Enum)]`. Example code that triggers this vulnerability looks like this: ```rust enum E { A, B, C, } impl Enum for E { const LENGTH: usize = 2; fn from_usize(value: usize) -> E { match value { 0 => E::A, 1 => E::B, 2 => E::C, _ => unimplemented!(), } } fn into_usize(self) -> usize { self as usize } } impl<V> EnumArray<V> for E { type Array = [V; 3]; } let _map: EnumMap<E, String> = enum_map! { _ => "Hello, world!".into() }; ``` The flaw was corrected in commit [b824e23](https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc) by putting `LENGTH` property on sealed trait for macro to read.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'enum-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-2'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/enum-map/RUSTSEC-2022-0010.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/enum-map'}, {'type': 'WEB', 'url': 'https://github.com/xfix/enum-map/blob/master/CHANGELOG.md#version-202'}, {'type': 'WEB', 'url': 'https://gitlab.com/KonradBorowski/enum-map/-/blob/master/CHANGELOG.md#version-202'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0010.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:53:32Z', 'nvd_published_at': None}
1.4.0
GHSA-7495-24mx-hph2
2022-12-05T21:53:31Z
2022-06-24T00:00:31Z
null
['CVE-2022-34201']
Missing permission check in Jenkins Convertigo Mobile Platform Plugin
A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-5g4r-2qhx-vqfm
2022-06-06T21:22:05Z
2022-06-06T21:22:05Z
null
['CVE-2022-31026']
Use of Uninitialized Variable in trilogy
### Impact When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. ### Patches Users of the trilogy gem should upgrade to version 2.1.1 ### Workarounds This issue can be avoided by only connecting to trusted servers. ### Acknowledgements We would like to thank Sergei Volokitin for reporting this vulnerability ### For more information If you have any questions or comments about this advisory: * Open an issue in [trilogy](https://github.com/github/trilogy)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'trilogy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/github/trilogy/security/advisories/GHSA-5g4r-2qhx-vqfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31026'}, {'type': 'WEB', 'url': 'https://github.com/github/trilogy/commit/6bed62789eaf119902b0fe247d2a91d56c31a962'}, {'type': 'PACKAGE', 'url': 'https://github.com/github/trilogy'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/trilogy/CVE-2022-31026.yml'}]
{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:05Z', 'nvd_published_at': '2022-06-09T13:15:00Z'}
1.4.0
GHSA-8fvr-7945-mg7w
2022-06-20T21:36:42Z
2022-06-14T00:00:37Z
null
['CVE-2022-2060']
Cross site scripting in dolibarr
A Cross-site Scripting (XSS) vulnerability exists in the admin/accountant.php file. The fields `town`, `name`, and `Accountant code` can be used to escape double quote protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2060'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2b5b9957c3010a5db9d1988c2efe5b209b16b47f'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:10:52Z', 'nvd_published_at': '2022-06-13T09:15:00Z'}
1.4.0
GHSA-jx34-gqqq-r6gm
2022-07-11T19:25:29Z
2022-06-29T22:14:03Z
null
['CVE-2022-25238']
Stored XSS via HTML fields in SilverStripe Framework
SilverStripe Framework through 4.10.8 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25238'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-25238.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-25238'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:14:03Z', 'nvd_published_at': '2022-06-28T22:15:00Z'}
1.4.0
GHSA-mmh6-m7v9-5956
2022-06-03T22:25:16Z
2022-06-03T00:01:00Z
null
['CVE-2021-43308']
Regular expression denial of service in markdown-link-extractor
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
[]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43308'}, {'type': 'PACKAGE', 'url': 'https://github.com/tcort/markdown-link-extractor'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:25:16Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-xfjq-5m4w-cc6h
2022-07-05T22:59:47Z
2022-06-24T00:00:32Z
null
['CVE-2022-34208']
Missing Authorization in Jenkins Beaker builder Plugin
A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34208'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-jmwx-r3gq-qq3p
2022-06-17T00:27:57Z
2022-06-17T00:27:57Z
null
[]
vec-const attempts to construct a Vec from a pointer to a const slice
Affected versions of this crate claimed to construct a const `Vec` with nonzero length and capacity, but that cannot be done because such a `Vec` requires a pointer from an allocator. The implementation was later changed to just construct a `std::borrow::Cow`.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'vec-const'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Eolu/vec-const/issues/1#issuecomment-898908241'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eolu/vec-const/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0082.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:57Z', 'nvd_published_at': None}
1.4.0
GHSA-wwh2-r387-g5rm
2023-06-13T22:06:25Z
2022-06-17T00:26:05Z
null
[]
tower-http's improper validation of Windows paths could lead to directory traversal attack
`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tower-rs/tower-http/pull/204'}, {'type': 'PACKAGE', 'url': 'https://github.com/tower-rs/tower-http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0135.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:26:05Z', 'nvd_published_at': None}
1.4.0
GHSA-6692-8qqf-79jc
2022-06-17T00:24:29Z
2022-06-17T00:24:29Z
null
[]
`Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate)
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. The problem was fixed in commit `cdff034` by zero-initializing the buffer before passing it to a user-provided `Read` implementation.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'tectonic_xdv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/issues/752'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/commit/cdff034e6d93cdfdafd13d8c6956e22fa5a57b79'}, {'type': 'PACKAGE', 'url': 'https://github.com/tectonic-typesetting/tectonic'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0112.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:24:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9h79-5m2f-mqj2
2022-12-05T21:39:19Z
2022-06-24T00:00:32Z
null
['CVE-2022-34213']
Squash TM Publisher (Squash4Jenkins) Plugin stores passwords stored in plain text
Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file `org.jenkinsci.squashtm.core.SquashTMPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:squashtm-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34213'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/squashtm-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:14:56Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-q4qm-xhf9-4p8f
2022-09-13T21:28:10Z
2022-06-03T00:01:07Z
null
['CVE-2022-30034']
Flower OAuth authentication bypass
All versions of Flower, a web UI for the Celery Python RPC framework, as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes. A fix was released in version 1.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30034'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/issues/1217'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/pull/1216'}, {'type': 'PACKAGE', 'url': 'https://github.com/mher/flower'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flower/PYSEC-2022-42973.yaml'}, {'type': 'WEB', 'url': 'https://tprynn.github.io/2022/05/26/flower-vulns.html'}, {'type': 'WEB', 'url': 'http://githubcommherflower.com'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:29:21Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-qmx3-m648-hr74
2022-07-05T18:03:15Z
2022-06-23T00:00:34Z
null
['CVE-2022-32549']
Log Injection in Apache Sling Commons Log and Apache Sling API
Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.25.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32549'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7z6h3806mwcov5kx6l96pq839sn0po1v'}]
{'cwe_ids': ['CWE-116', 'CWE-117'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:50Z', 'nvd_published_at': '2022-06-22T15:15:00Z'}
1.4.0
GHSA-5c5f-7vfq-3732
2022-07-05T21:24:30Z
2022-06-07T00:00:31Z
null
['CVE-2022-32511']
JMESPath for Ruby uses unsafe JSON.load when safe JSON.parse is preferable
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'jmespath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32511'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/pull/55'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/commit/e8841280053a9d9a0c90f36223f926c8b9e4ec49'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmespath/jmespath.rb'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/compare/v1.6.0...v1.6.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jmespath/CVE-2022-32511.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/376NUPIPTYBWWGS33GO4UOLQRI4D3BTP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ2YWONVFFOPACHAT4MM7ZBT4DNHOF5/'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/a/30050571/580231'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:51Z', 'nvd_published_at': '2022-06-06T22:15:00Z'}
1.4.0
GHSA-pg8v-g4xq-hww9
2022-07-07T17:13:54Z
2022-06-25T00:00:54Z
null
['CVE-2022-32209']
Rails::Html::Sanitizer vulnerable to Cross-site Scripting
Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted if allowed tags are being overridden. This may be done via application configuration: ```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]``` see https://guides.rubyonrails.org/configuring.html#configuring-action-view Or it may be done with a `:tags` option to the Action View helper `sanitize`: ```<%= sanitize @comment.body, tags: ["select", "style"] %>``` see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize It may also be done with Rails::Html::SafeListSanitizer directly: ```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]``` or with ```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])``` All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" are recommended to upgrade immediately. A workaround for this issue can be applied by removing either `select` or `style` from the overridden allowed tags.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32209'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1530898'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T18:10:35Z', 'nvd_published_at': '2022-06-24T15:15:00Z'}
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
0
Edit dataset card