ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist
|
GHSA-m884-279h-32v2
|
Exceptions displayed in non-debug configurations in Symfony
|
Description
-----------
When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments.
Resolution
----------
The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments.
The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4.
Credits
-------
I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.
|
{'CVE-2020-5274'}
|
2021-05-12T23:54:24Z
|
2020-03-30T20:09:31Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5274', 'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}
| null |
Packagist
|
GHSA-x5r2-hj5c-8jx6
|
SSRF in adminer
|
### Impact
Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected.
### Patches
Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
* Use a single driver version (e.g. `adminer-mysql.php`).
* Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/).
### References
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf
### For more information
If you have any questions or comments about this advisory:
* Comment at ccd2374b.
|
{'CVE-2021-21311'}
|
2021-06-24T19:56:17Z
|
2021-02-11T20:42:59Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf'}
| null |
Packagist
|
GHSA-533p-cp2g-99wp
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3931'}
|
2021-11-17T21:12:46Z
|
2021-11-15T23:19:09Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e', 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-6rmq-x2hv-vxpp
|
Vulnerable third party libraries in certain configurations of Symfony
|
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
|
{'CVE-2019-6338'}
|
2021-08-19T15:23:18Z
|
2019-12-02T18:11:25Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://www.drupal.org/sa-core-2019-001', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html', 'https://www.debian.org/security/2019/dsa-4370', 'http://www.securityfocus.com/bid/106706'}
| null |
Packagist
|
GHSA-xg6r-5gx4-qxjm
|
invoiceninja is vulnerable to Cross-site Scripting
|
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3977'}
|
2022-01-05T20:32:32Z
|
2022-01-06T21:58:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/invoiceninja/invoiceninja', 'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35'}
| null |
Packagist
|
GHSA-7xj5-fwqr-5378
|
Cross-site Scripting in craftcms/cms
|
Craft CMS before 3.7.29 allows cross-site scripting.
|
{'CVE-2022-28378'}
|
2022-04-18T22:20:39Z
|
2022-04-04T00:00:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/craftcms/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18'}
| null |
Packagist
|
GHSA-mw75-qvfr-hpmr
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0938'}
|
2022-03-23T15:38:52Z
|
2022-03-15T00:01:01Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}
| null |
Packagist
|
GHSA-3p9j-442x-hjp7
|
Business Logic Errors in microweber
|
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
|
{'CVE-2022-0689'}
|
2022-02-23T19:27:39Z
|
2022-02-20T00:00:31Z
|
MODERATE
| null | null |
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
| null |
Packagist
|
GHSA-pp2h-95hm-hv9r
|
Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore
|
### Impact
Data Object CSV import allows formular injection.
### Patches
Problem is patched in 10.1.1
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/9992.patch
### References
https://cwe.mitre.org/data/definitions/1236.html
|
{'CVE-2021-37702'}
|
2021-08-27T12:49:12Z
|
2021-08-30T16:13:13Z
|
MODERATE
| null |
{'CWE-1236'}
|
{'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r', 'https://github.com/pimcore/pimcore/pull/9992', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37702', 'https://github.com/pimcore/pimcore'}
| null |
Packagist
|
GHSA-3q5x-7mxp-rp6j
|
Remote code execution via vulnerable Symphony dependecy injection
|
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.
|
{'CVE-2019-8135'}
|
2021-08-18T22:23:57Z
|
2019-11-12T22:59:32Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}
| null |
Packagist
|
GHSA-gj26-g5qf-jrh7
|
Cross-site Scripting in librenms
|
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
|
{'CVE-2022-0589'}
|
2022-02-24T13:06:10Z
|
2022-02-16T00:01:51Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589', 'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768'}
| null |
Packagist
|
GHSA-82xf-8h9p-c6qj
|
Cross-Site Request Forgery in forkcms
|
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
|
{'CVE-2020-23264'}
|
2021-05-19T20:53:27Z
|
2021-06-22T15:23:45Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23264', 'https://github.com/forkcms/forkcms/pull/3123'}
| null |
Packagist
|
GHSA-4vpc-5jx4-cfqg
|
User enumeration leak using switch user functionality in Symfony
|
An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.
|
{'CVE-2019-18886'}
|
2021-07-28T15:49:16Z
|
2019-12-02T18:09:21Z
|
MODERATE
| null |
{'CWE-203', 'CWE-200'}
|
{'https://symfony.com/cve-2019-18886', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml', 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality'}
| null |
Packagist
|
GHSA-vf4w-fg7r-5v94
|
Improper Certificate Validation in phpseclib
|
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.
|
{'CVE-2021-30130'}
|
2021-04-23T00:22:49Z
|
2021-04-07T20:56:55Z
|
HIGH
| null |
{'CWE-295', 'CWE-347'}
|
{'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130', 'https://github.com/phpseclib/phpseclib/pull/1635', 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}
| null |
Packagist
|
GHSA-5fxv-xx5p-g2fv
|
Integer Overflow in microweber
|
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
|
{'CVE-2022-0968'}
|
2022-03-25T17:13:37Z
|
2022-03-16T00:00:46Z
|
HIGH
| null |
{'CWE-190'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e', 'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968'}
| null |
Packagist
|
GHSA-96v6-hrwg-p378
|
Weak Password Requirements in Daybyday CRM
|
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
|
{'CVE-2022-22110'}
|
2022-01-24T22:07:06Z
|
2022-01-08T00:31:51Z
|
HIGH
| null |
{'CWE-521'}
|
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/Bottelet/DaybydayCRM/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110'}
| null |
Packagist
|
GHSA-gprh-7767-cw39
|
Code Injection in Bolt CMS
|
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
|
{'CVE-2021-40219'}
|
2022-04-22T20:18:24Z
|
2022-04-12T00:00:34Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40219', 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php', 'https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219', 'https://github.com/bolt/core', 'http://boltcms.com'}
| null |
Packagist
|
GHSA-8hcm-jj4x-4gmr
|
Cross-site scripting in tribalsystems/zenario
|
Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component.
|
{'CVE-2021-27673'}
|
2021-04-23T00:23:34Z
|
2021-06-08T20:11:40Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27673', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
| null |
Packagist
|
GHSA-2cqg-q7jm-j35c
|
snipe-it is vulnerable to Cross-site Scripting
|
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-3938'}
|
2021-11-17T21:13:25Z
|
2021-11-15T23:19:42Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
| null |
Packagist
|
GHSA-m2jh-fxw4-gphm
|
HTTP Host Header Injection
|
### Meta
* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5)
### Problem
It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment.
This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability.
### Solution
Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
### Credits
Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015)
* [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0
|
{'CVE-2021-41114'}
|
2021-10-05T18:47:01Z
|
2021-10-05T20:23:35Z
|
MODERATE
| null |
{'CWE-20', 'CWE-644'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3941', 'https://github.com/TYPO3/typo3', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015'}
| null |
Packagist
|
GHSA-3374-7h99-xr85
|
Cross-site scripting in forkcms
|
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
|
{'CVE-2020-23049'}
|
2021-10-29T13:52:23Z
|
2021-10-25T19:43:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6', 'https://github.com/forkcms/forkcms'}
| null |
Packagist
|
GHSA-x68c-4gmm-5g43
|
kimai2 is vulnerable to Cross-site Scripting
|
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-3985'}
|
2021-12-03T15:19:53Z
|
2021-12-03T20:40:38Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985'}
| null |
Packagist
|
GHSA-88f9-7xxh-c688
|
Configuration leak
|
### Impact
Authenticated users, regardless of their privileges (_User_ or _Admin_), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc).
### Patches
This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file.
### Workarounds
Only allow trusted source IP addresses to access to the administration dashboard.
### References
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-39174'}
|
2021-08-30T22:12:01Z
|
2021-08-30T16:11:43Z
|
HIGH
| null |
{'CWE-75'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39174', 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688'}
| null |
Packagist
|
GHSA-h7vq-5qgw-jwwq
|
CSV Injection Vulnerability
|
### Impact
In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.
If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.
### Patches
This has been patched in Craft 3.7.14.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28
* https://twitter.com/craftcmsupdates/status/1442928690145366018
### For more information
If you have any questions or comments about this advisory, email us at support@craftcms.com
----------
Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
|
{'CVE-2021-41824'}
|
2021-10-18T19:11:00Z
|
2021-10-18T19:04:16Z
|
HIGH
| null |
{'CWE-1236'}
|
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://twitter.com/craftcmsupdates/status/1442928690145366018', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms'}
| null |
Packagist
|
GHSA-cpq8-x35g-m439
|
Cross-site Scripting in yourls
|
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
|
{'CVE-2021-3783'}
|
2021-09-16T18:19:29Z
|
2021-09-20T20:43:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783', 'https://github.com/yourls/yourls', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
| null |
Packagist
|
GHSA-rrgw-3hg3-9x8c
|
XSS vulnerability in translations
|
### Summary
An attacker with admin privileges and access to Translations management functionality may add JS payload to translation values via:
- Translation management UI.
- Translations downloaded via the Crowdin service may also contain JS strings used for XSS attacks, for a successful attack poisoned translation should be enabled, downloaded, and installed.
- Translations uploaded via Upload translation file on the All Languages grid
### Workarounds
There are no workarounds that address this vulnerability.
| null |
2022-01-10T21:39:18Z
|
2022-01-12T21:49:49Z
|
MODERATE
| null | null |
{'https://github.com/oroinc/platform-er/security/advisories/GHSA-rrgw-3hg3-9x8c'}
| null |
Packagist
|
GHSA-x2xg-6wcj-6xf9
|
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
|
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
|
{'CVE-2020-36474'}
|
2021-08-24T20:08:25Z
|
2021-08-25T14:49:48Z
|
CRITICAL
| null | null |
{'https://github.com/vanilla/safecurl/pull/2', 'https://github.com/vanilla/safecurl/', 'https://github.com/vanilla/safecurl/releases/tag/v0.9.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36474'}
| null |
Packagist
|
GHSA-w4pj-7p68-3vgv
|
Stored XSS in October
|
### Impact
A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field.
### Patches
Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission.
### Workarounds
Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin).
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
|
{'CVE-2020-11083'}
|
2021-03-04T18:26:22Z
|
2020-08-05T14:52:44Z
|
LOW
| null |
{'CWE-79'}
|
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083'}
| null |
Packagist
|
GHSA-7vmw-7x57-q6jw
|
Cross-site scripting
|
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
|
{'CVE-2021-32713'}
|
2021-06-25T15:33:55Z
|
2021-09-08T18:00:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
| null |
Packagist
|
GHSA-m553-9wmx-533h
|
Cross-site scripting in Dolibarr
|
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
|
{'CVE-2019-16197'}
|
2021-08-18T19:24:26Z
|
2019-11-08T20:05:31Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html', 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
| null |
Packagist
|
GHSA-2v2v-fx7r-f2fh
|
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
|
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-4082'}
|
2021-12-14T14:45:36Z
|
2021-12-16T14:28:10Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}
| null |
Packagist
|
GHSA-xgx2-332h-9x6q
|
SQL Injection in Yeswiki
|
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
|
{'CVE-2021-43091'}
|
2022-03-30T15:24:00Z
|
2022-03-26T00:00:32Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/yeswiki/yeswiki', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'}
| null |
Packagist
|
GHSA-7w4p-72j7-v7c2
|
Phar object injection in PHPMailer
|
PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr.
### Impact
Object injection, possible remote code execution
### Patches
Fixed in 6.0.6 and 5.2.27
### Workarounds
Validate and sanitise user input before using.
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-19296
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2018-19296'}
|
2021-08-19T19:57:58Z
|
2020-03-05T22:08:55Z
|
HIGH
| null |
{'CWE-502', 'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19296', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/', 'https://www.debian.org/security/2018/dsa-4351', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml'}
| null |
Packagist
|
GHSA-h59f-p56g-g75v
|
SQL Injection in librenms
|
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.
|
{'CVE-2020-35700'}
|
2021-04-05T20:39:08Z
|
2021-05-06T18:53:02Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/librenms/librenms/issues/12405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35700', 'https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php', 'https://github.com/librenms/librenms/pull/12422', 'https://www.horizon3.ai/disclosures/librenms-second-order-sqli', 'https://github.com/librenms/librenms/releases/tag/21.1.0'}
| null |
Packagist
|
GHSA-m8xh-cqc2-5q6f
|
Type Confusion in ImpressCMS
|
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
|
{'CVE-2021-26600'}
|
2022-04-01T17:14:56Z
|
2022-03-29T00:01:16Z
|
CRITICAL
| null |
{'CWE-843'}
|
{'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'http://karmainsecurity.com/KIS-2022-01', 'https://github.com/ImpressCMS/impresscms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600', 'http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html', 'http://seclists.org/fulldisclosure/2022/Mar/43', 'https://hackerone.com/reports/1081986'}
| null |
Packagist
|
GHSA-5mwx-f6w6-7w5r
|
Cross-site Scripting in GeniXCMS
|
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
|
{'CVE-2022-24563'}
|
2022-03-10T22:00:31Z
|
2022-03-04T00:00:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563', 'https://github.com/semplon/GeniXCMS', 'https://github.com/truonghuuphuc/CVE', 'https://genix.me/'}
| null |
Packagist
|
GHSA-g8r4-p96j-xfxc
|
Twig allowing dangerous PHP functions by default in getgrav/grav
|
### Impact
Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.
### Patches
The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`).
Futures major versions of Grav may disable this functionality by default.
### Workarounds
Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
### References
- https://portswigger.net/research/server-side-template-injection
- https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-29440'}
|
2021-07-13T15:49:43Z
|
2021-04-16T19:53:12Z
|
HIGH
| null |
{'CWE-94'}
|
{'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html', 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc', 'https://packagist.org/packages/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}
| null |
Packagist
|
GHSA-67c7-5v9j-227r
|
Cross-site Scripting in kimai2
|
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-3983'}
|
2021-12-03T15:16:39Z
|
2021-12-03T20:43:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3983', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413', 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}
| null |
Packagist
|
GHSA-j29g-g982-pwpv
|
Cross-site scripting (XSS)
|
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
|
{'CVE-2020-17551'}
|
2021-03-12T20:09:58Z
|
2021-03-12T21:34:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.impresscms.org/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17551', 'https://github.com/ImpressCMS/impresscms/issues/659'}
| null |
Packagist
|
GHSA-vx6j-pjrh-vgjh
|
PHP file inclusion in the Sulu admin panel
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
* Compromised components: Arbitrary file read on the server, (Potential) Remote code execution
* Exploitation pre-requisite: User account on the backend
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
|
{'CVE-2021-43836'}
|
2021-12-15T22:27:31Z
|
2021-12-15T22:54:20Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu'}
| null |
Packagist
|
GHSA-rqgp-ccph-5w65
|
Cross-Site Request Forgery in firefly-iii
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3901'}
|
2021-11-02T18:42:29Z
|
2021-10-28T23:14:14Z
|
LOW
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://github.com/firefly-iii/firefly-iii'}
| null |
Packagist
|
GHSA-93pj-4p65-qmr9
|
Insufficient user authorization in Moodle
|
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
|
{'CVE-2022-0334'}
|
2022-02-02T16:13:31Z
|
2022-01-28T22:07:40Z
|
MODERATE
| null |
{'CWE-668', 'CWE-863'}
|
{'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://moodle.org/mod/forum/discuss.php?d=431102'}
| null |
Packagist
|
GHSA-55mm-5399-7r63
|
Reliance on Cookies without validation in OctoberCMS
|
### Impact
Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.
Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them.
### Patches
Issue has been patched in Build 468 (v1.0.468).
>**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires).
### Workarounds
Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468.
### References
- https://blog.laravel.com/laravel-cookie-security-releases
- https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences.
### Acknowledgements
Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
|
{'CVE-2020-15128'}
|
2021-03-04T18:25:42Z
|
2020-08-05T14:52:54Z
|
MODERATE
| null |
{'CWE-565', 'CWE-327'}
|
{'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}
| null |
Packagist
|
GHSA-6x98-fx9j-7c78
|
Disabled users able to log in with third party SSO plugin
|
### Impact
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2017-1000489'}
|
2021-01-19T21:13:44Z
|
2021-01-19T21:16:19Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78'}
| null |
Packagist
|
GHSA-wg8p-w946-c482
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
|
{'CVE-2022-0956'}
|
2022-03-29T16:42:37Z
|
2022-03-16T00:00:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2'}
| null |
Packagist
|
GHSA-hj8g-cw8x-2c6m
|
Cross-site Scripting in Microweber
|
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
|
{'CVE-2022-0719'}
|
2022-02-24T21:51:08Z
|
2022-02-24T00:00:53Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719'}
| null |
Packagist
|
GHSA-xhh6-956q-4q69
|
Argument injection in a MimeTypeGuesser in Symfony
|
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).
|
{'CVE-2019-18888'}
|
2021-07-28T16:28:00Z
|
2019-12-02T18:08:19Z
|
HIGH
| null |
{'CWE-20', 'CWE-88'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://symfony.com/cve-2019-18888', 'https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18888', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml'}
| null |
Packagist
|
GHSA-m5v7-pr32-mjx2
|
Critical severity vulnerability in Ignition
|
The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env.
NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.
|
{'CVE-2020-13909'}
|
2021-11-18T20:37:40Z
|
2021-10-12T16:29:13Z
|
CRITICAL
| null | null |
{'https://github.com/facade/ignition/releases/tag/2.0.5', 'https://github.com/github/advisory-database/issues/2316', 'https://github.com/facade/ignition/compare/2.0.4...2.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13909', 'https://github.com/facade/ignition', 'https://www.cve.org/CVERecord?id=CVE-2020-13909'}
| null |
Packagist
|
GHSA-cv7m-wc7g-7gfp
|
Cross-Site Request Forgery in MAGMI
|
All versions of MAGMI up to and including version 0.7.24 are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.
|
{'CVE-2020-5776'}
|
2021-05-05T19:10:44Z
|
2021-05-06T18:54:41Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://www.tenable.com/security/research/tra-2020-51', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5776'}
| null |
Packagist
|
GHSA-c9hq-g4q8-w893
|
Privilage Escalation in moodle
|
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25701'}
|
2021-03-24T23:17:02Z
|
2021-03-29T20:42:55Z
|
MODERATE
| null |
{'CWE-863'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895432', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701'}
| null |
Packagist
|
GHSA-x2gw-85w6-fjjw
|
Cross-site scripting in demos/demo.mysqli.php in getID3
|
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.
|
{'CVE-2021-40926'}
|
2021-10-05T16:02:41Z
|
2021-10-04T20:13:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/JamesHeinrich/getID3/issues/341', 'https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21', 'https://github.com/JamesHeinrich/getID3/pull/342', 'https://github.com/JamesHeinrich/getID3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40926'}
| null |
Packagist
|
GHSA-mjvc-j6rv-9xj8
|
Insertion of Sensitive Information Into Debugging Code in Microweber
|
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
|
{'CVE-2022-0721'}
|
2022-02-24T21:47:33Z
|
2022-02-24T00:00:54Z
|
HIGH
| null |
{'CWE-215'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb', 'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://github.com/microweber/microweber'}
| null |
Packagist
|
GHSA-32m2-9f76-4gv8
|
Business Logic Errors in SilverStripe Framework
|
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
|
{'CVE-2022-0227'}
|
2022-02-11T20:51:39Z
|
2022-02-06T00:01:01Z
|
MODERATE
| null | null |
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://github.com/silverstripe/silverstripe-framework'}
| null |
Packagist
|
GHSA-jvg4-9rc2-wvcr
|
Generation of fake documents via public GET-call
|
### Impact
Generation of fake documents via public GET-call
### Patches
We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
| null |
2021-02-10T02:17:07Z
|
2021-02-10T02:32:07Z
|
LOW
| null |
{'CWE-862'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-jvg4-9rc2-wvcr', 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://packagist.org/packages/shopware/platform', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}
| null |
Packagist
|
GHSA-8wf2-3ggj-78q9
|
Improper Authentication in phpmyadmin
|
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
|
{'CVE-2022-23807'}
|
2022-01-28T22:31:16Z
|
2022-01-28T22:44:40Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23807', 'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/'}
| null |
Packagist
|
GHSA-4xww-6h7v-29jg
|
User enumeration in livehelperchat
|
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
|
{'CVE-2022-0083'}
|
2022-01-12T19:34:13Z
|
2022-01-21T23:37:07Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}
| null |
Packagist
|
GHSA-xgpf-p52j-pf7m
|
XSS in CreateQueuedJobTask
|
A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.
|
{'CVE-2021-27938'}
|
2021-03-24T17:41:15Z
|
2021-03-24T17:42:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/symbiote/silverstripe-queuedjobs/releases', 'https://www.silverstripe.org/download/security-releases/cve-2021-27938', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml'}
| null |
Packagist
|
GHSA-h79x-98r2-g6qc
|
Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP
|
# Impact
Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other.
This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy).
If you are using a proxy, please check that it supports protocol encryption and that it is enabled.
# Technical details
<details>
<summary>click to expand</summary>
## Basics
1. The client generates a private ECC key `clientPriv` which it uses to complete ECDH for encryption.
2. A JWT containing the public key `clientPub` corresponding to this key is signed by Microsoft servers with the [Mojang root public key](https://github.com/pmmp/PocketMine-MP/blob/stable/src/network/mcpe/auth/ProcessLoginTask.php#L42) `mojangPub`.
3. The server verifies that the token was issued by Microsoft servers by verifying the JWT signature with `mojangPub`.
## Why this is a problem
However, this only ensures that the token was issued by Microsoft. It does _not_ ensure that the client actually possesses the private key corresponding to the public key in the token.
In a login replay attack, the attacker sends a login captured from another session. This login is valid because it is verifiable by `mojangPub`; however, without encryption, the server doesn't know that the client actually possesses `clientPriv`, and the authenticity of the client cannot be verified.
## How encryption prevents the attack
1. The server calculates a shared secret for encryption using ECDH of `serverPriv` and `clientPub`.
2. It then signs a return token using `serverPriv` and sends this to the client, along with `serverPub`.
3. The client then verifies the JWT using `serverPub`, and calculates the same shared secret as the server using `clientPriv` and `serverPub`.
If the client does not possess `clientPriv` (i.e. because it replayed a stolen login), then the session cannot proceed once encryption is enabled, since the client cannot calculate the shared secret needed to decrypt the server packets and encrypt its own packets.
**Since PM3 does not implement protocol encryption, this means that ALL versions of PM3 are affected by this login stealing attack.**
## How does the attacker capture a login in the first place?
The typical way to do this would be to trick a player into joining a server controlled by the attacker. This would allow the attacker to grab the login from the connection and store it for future use.
## Are the logins valid forever?
No. All the JWTs have expiry dates after which they cannot be used. These expiry dates are typically 2-3 days after the token was issued by XBOX servers. PocketMine-MP 3.x does verify these expiry dates, so the use-by dates of these attacks are limited.
</details>
# Patches
This problem has been fixed in all 4.x versions by implementing Minecraft protocol encryption.
~This has not yet been addressed on 3.x, but since this vulnerability is already public knowledge, the advisory has been released early to make sure people are aware of it and the mitigation steps they can take.~
Update 2022-01-22: This has been fixed on 3.x by d28be4eaf24a890f7ef110a51181a3d806a6acca.
# Workarounds
- Use a proxy that supports encryption such as [gophertunnel](https://github.com/Sandertv/gophertunnel) between your server and players. Make sure that the server only accepts connections from the proxy. If the proxy is on the same machine as the server, you can use `server-ip=127.0.0.1` to ensure that only the proxy can create connections for you.
The following things may help mitigate the problem:
- Verify that the `LoginPacket` `serverAddress` field is the same as the server's exposed domain name. For example: https://github.com/JustTalDevelops/AntiLoginForger
**WARNING: THIS DOES NOT SOLVE THE ROOT ISSUE. YOU WILL REMAIN VULNERABLE UNLESS YOU UPGRADE.**
# For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-01-24T22:08:04Z
|
2022-01-21T23:02:15Z
|
MODERATE
| null | null |
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/pmmp/PocketMine-MP/issues/4580'}
| null |
Packagist
|
GHSA-69wp-xwm7-69wm
|
Exposure of Resource to Wrong Sphere in ThinkPHP Framework
|
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php.
|
{'CVE-2022-25481'}
|
2022-04-01T13:50:10Z
|
2022-03-22T00:00:43Z
|
HIGH
| null |
{'CWE-668'}
|
{'https://github.com/top-think/framework', 'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'}
| null |
Packagist
|
GHSA-728c-42pc-fwxg
|
Unrestricted Upload of File with Dangerous Type in Crater
|
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
|
{'CVE-2022-0242'}
|
2022-01-19T14:08:43Z
|
2022-01-21T23:54:50Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}
| null |
Packagist
|
GHSA-57gr-jvqr-3hwm
|
Incorrect access control in typo3_forum
|
The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.
|
{'CVE-2020-15513'}
|
2021-09-23T17:35:16Z
|
2020-07-29T18:07:38Z
|
MODERATE
| null |
{'CWE-863'}
|
{'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15513'}
| null |
Packagist
|
GHSA-gf2c-93hm-r9j5
|
Cross-site Scripting in kimai2
|
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.
|
{'CVE-2021-3963'}
|
2021-11-22T18:42:37Z
|
2021-11-23T18:16:43Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8', 'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
| null |
Packagist
|
GHSA-6gc6-m364-85ww
|
Log injection in SimpleSAMLphp
|
### Background
SimpleSAMLphp has a logging functionality that allows system administrators to keep track of the activity, errors, and statistics. Additionally, it allows users to report errors, shall they happen. An error report contains a report identifier, which is logged once submitted.
### Description
The `www/erroreport.php` script, which receives error reports and sends them via email to the system administrator, didn't properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID.
When configured to use the `file` logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the `reportID` parameter received in a request sent to `www/errorreport.php` was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.
### Affected versions
SimpleSAMLphp versions up to **1.18.3**.
### Impact
An attacker may use this issue to inject logs messages into a SimpleSAMLphp log file, trying to trick or confuse system administrators. However, the attack surface is considered small, as the attack will only work with the `file` logging handler, which opens the log file in _append-only_ mode. This means an attacker cannot edit or remove existing log messages, and even if non-ascii characters are written to the log, the file will always be readable with a simple text editor.
### Resolution
Upgrade the SimpleSAMLphp installation to version **1.18.4**.
### Credit
This vulnerability was discovered and reported by Frederic Vleminckx on January 23, 2020.
|
{'CVE-2020-5225'}
|
2021-01-08T20:33:05Z
|
2020-01-24T21:26:13Z
|
LOW
| null |
{'CWE-532'}
|
{'https://simplesamlphp.org/security/202001-02', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5225'}
| null |
Packagist
|
GHSA-h76r-vgf3-j6w5
|
Auth bypass and account takeover in October CMS
|
### Impact
An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie.
- To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing.
- Due to the logic of how this mechanism works, a targeted user account must be logged in while
the attacker is exploiting the vulnerability.
- Authorization via persist cookie not shown in access logs.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-29487'}
|
2022-01-20T15:39:14Z
|
2021-08-30T16:13:50Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5'}
| null |
Packagist
|
GHSA-xcrg-29h7-h4cj
|
XXE in PHPSpreadsheet due to encoding issue
|
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
|
{'CVE-2018-19277'}
|
2022-04-19T20:14:24Z
|
2019-11-20T01:38:52Z
|
HIGH
| null |
{'CWE-91'}
|
{'https://www.drupal.org/sa-contrib-2021-043', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277', 'https://github.com/PHPOffice/PhpSpreadsheet', 'https://github.com/PHPOffice/PhpSpreadsheet/issues/771', 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18', 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/'}
| null |
Packagist
|
GHSA-x7cr-6qr6-2hh6
|
Missing input validation can lead to command execution in composer
|
The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used.
This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers.
Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json.
To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report.
|
{'CVE-2022-24828'}
|
2022-04-22T20:15:38Z
|
2022-04-22T20:15:38Z
|
HIGH
| null |
{'CWE-94', 'CWE-20'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://github.com/composer/composer', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/'}
| null |
Packagist
|
GHSA-xp82-jmw8-mjxp
|
Unrestricted Upload of File with Dangerous Type in ShowDoc
|
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
|
{'CVE-2022-1034'}
|
2022-03-30T19:58:48Z
|
2022-03-23T00:00:23Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
| null |
Packagist
|
GHSA-cq6h-w3mc-57f4
|
Information exposure via query strings in URL
|
### Impact
Information exposure via query strings in URL
### Patches
We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020
### Credits
We would like to thank <a rel="noopener" href="https://www.vater-it.de/">Oliver Herrmann</a> for reporting this issue.
| null |
2020-12-21T17:46:14Z
|
2020-12-21T18:01:16Z
|
LOW
| null |
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-cq6h-w3mc-57f4'}
| null |
Packagist
|
GHSA-8vp7-j5cj-vvm2
|
Ability to expose data in Sylius by using an unintended serialisation group
|
### Impact
ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.
Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`.
### Patches
The patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3.
After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used.
This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly.
### Workarounds
Service `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted.
|
{'CVE-2020-5220'}
|
2021-01-08T20:32:44Z
|
2020-01-31T18:00:43Z
|
MODERATE
| null |
{'CWE-444'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/sylius/CVE-2020-5220.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5220'}
| null |
Packagist
|
GHSA-24m3-w8g9-jwpq
|
Information disclosure of source code in SimpleSAMLphp
|
### Background
The module controller in `SimpleSAML\Module` that processes requests for pages
hosted by modules, has code to identify paths ending with `.php` and process
those as PHP code. If no other suitable way of handling the given path exists it
presents the file to the browser.
### Description
The check to identify paths ending with `.php` does not account for uppercase
letters. If someone requests a path ending with e.g. `.PHP` and the server is
serving the code from a case-insensitive file system, such as on Windows, the
processing of the PHP code does not occur, and the source code is instead
presented to the browser.
### Affected versions
SimpleSAMLphp versions **1.18.5 and older**.
### Impact
An attacker may use this issue to gain access to the source code in third-party
modules that is meant to be private, or even sensitive. However, the attack
surface is considered small, as the attack will only work when SimpleSAMLphp
serves such content from a file system that is not case-sensitive, such as on
Windows.
### Resolution
Upgrade the SimpleSAMLphp installation to version **1.18.6**.
### Credit
This vulnerability was discovered and reported by Sławek Naczyński.
|
{'CVE-2020-5301'}
|
2021-10-20T22:23:05Z
|
2020-04-22T20:59:44Z
|
LOW
| null |
{'CWE-178', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
| null |
Packagist
|
GHSA-xc47-3rch-cv57
|
Improper Access Control in snipe-it
|
Users with no system permissions are able to see and create personal access tokens
|
{'CVE-2022-0178'}
|
2022-01-26T20:23:15Z
|
2022-01-26T20:24:23Z
|
MODERATE
| null |
{'CWE-284'}
|
{'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-7733-hjv6-4h47
|
Cross-Site Scripting in ternary conditional operator
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
> * CWE-79
---
:information_source: This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020
---
### Problem
It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.
```
{showFullName ? fullName : defaultValue}
```
### Solution
Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.
Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)
* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)
### Credits
Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.
### References
* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
|
{'CVE-2020-15241'}
|
2021-11-19T15:11:11Z
|
2020-10-08T19:55:53Z
|
MODERATE
| null |
{'CWE-79', 'CWE-601'}
|
{'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://github.com/TYPO3/Fluid', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}
| null |
Packagist
|
GHSA-q2cv-94xm-qvg4
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3921'}
|
2021-11-17T21:12:31Z
|
2021-11-15T23:18:00Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5'}
| null |
Packagist
|
GHSA-m9fq-c9hp-59g7
|
Cross-site Scripting in yourls
|
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
|
{'CVE-2021-3785'}
|
2021-09-24T13:08:49Z
|
2021-09-20T20:42:52Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://github.com/yourls/yourls'}
| null |
Packagist
|
GHSA-3qrq-r688-vvh4
|
Multiple valid tokens for password reset in Shopware
|
### Impact
Multiple tokens for password reset could be requested. All tokens could be used to change the password.
This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
{'CVE-2022-24892'}
|
2022-04-28T21:02:17Z
|
2022-04-28T21:02:17Z
|
MODERATE
| null |
{'CWE-640'}
|
{'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://github.com/shopware/shopware', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
| null |
Packagist
|
GHSA-xw7v-qrhc-jjg2
|
Access Control vulnerability in Dolibarr
|
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
|
{'CVE-2021-37517'}
|
2022-04-18T22:21:50Z
|
2022-04-01T00:00:41Z
|
HIGH
| null |
{'CWE-863'}
|
{'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}
| null |
Packagist
|
GHSA-m6ch-gg5f-wxx3
|
HTTP Proxy header vulnerability
|
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
|
{'CVE-2016-5385'}
|
2022-04-07T13:59:22Z
|
2022-04-07T13:59:22Z
|
HIGH
| null | null |
{'http://rhn.redhat.com/errata/RHSA-2016-1610.html', 'https://github.com/guzzle/guzzle/releases/tag/6.2.1', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us', 'https://httpoxy.org/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/', 'http://rhn.redhat.com/errata/RHSA-2016-1612.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/', 'http://www.debian.org/security/2016/dsa-3631', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://rhn.redhat.com/errata/RHSA-2016-1609.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297', 'http://www.securityfocus.com/bid/91821', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5385', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html', 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/', 'http://rhn.redhat.com/errata/RHSA-2016-1613.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1353794', 'http://www.kb.cert.org/vuls/id/797896', 'http://www.securitytracker.com/id/1036335', 'https://security.gentoo.org/glsa/201611-22', 'https://www.drupal.org/SA-CORE-2016-003', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149', 'http://rhn.redhat.com/errata/RHSA-2016-1611.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html'}
| null |
Packagist
|
GHSA-rc5r-697f-28x6
|
XSS injection in the Grid component of Sylius
|
Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.
|
{'CVE-2019-12186'}
|
2021-08-23T15:13:38Z
|
2020-04-15T21:07:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186', 'https://sylius.com/blog/cve-2019-12186/'}
| null |
Packagist
|
GHSA-6vfw-74wr-3chh
|
Cross-site Scripting in Crater Invoice
|
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
|
{'CVE-2022-0372'}
|
2022-02-03T21:01:10Z
|
2022-01-28T00:03:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
| null |
Packagist
|
GHSA-pr9q-v585-qv2w
|
Improper Privilege Management in Open Web Analytics
|
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
|
{'CVE-2022-24637'}
|
2022-03-30T20:03:55Z
|
2022-03-19T00:01:00Z
|
CRITICAL
| null |
{'CWE-269'}
|
{'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag/1.7.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24637', 'https://github.com/Open-Web-Analytics/Open-Web-Analytics', 'https://devel0pment.de/?p=2494'}
| null |
Packagist
|
GHSA-v94v-pxqp-5qgj
|
Cross-site Scripting in ShowDoc
|
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
|
{'CVE-2022-0950'}
|
2022-03-28T19:27:08Z
|
2022-03-16T00:00:48Z
|
MODERATE
| null |
{'CWE-79', 'CWE-434'}
|
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc'}
| null |
Packagist
|
GHSA-jmgg-wx67-7qfv
|
Command Injection in Centreon
|
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
|
{'CVE-2020-13252'}
|
2021-05-20T22:17:17Z
|
2021-06-22T15:23:33Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/centreon/centreon/compare/19.04.13...19.04.15', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252', 'https://github.com/centreon/centreon/pull/8467', 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html', 'https://engindemirbilek.github.io/centreon-19.10-rce'}
| null |
Packagist
|
GHSA-j8cx-j9j2-f29w
|
Insecure Storage of Sensitive Information in Microweber
|
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
|
{'CVE-2022-0724'}
|
2022-02-24T22:27:40Z
|
2022-02-24T00:00:53Z
|
HIGH
| null |
{'CWE-922'}
|
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724', 'https://github.com/microweber/microweber'}
| null |
Packagist
|
GHSA-mf3v-f2qq-pf9g
|
Insufficient Session Expiration in Sylius
|
### Impact
The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change.
### Patches
The issue is fixed in versions: 1.10.11, 1.11.2 and above
### Workarounds
You have to overwrite your `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class using this code:
```php
<?php
declare(strict_types=1);
namespace App\CommandHandler\Account;
use Sylius\Bundle\ApiBundle\Command\Account\ResetPassword;
use Sylius\Component\Core\Model\ShopUserInterface;
use Sylius\Component\Resource\Metadata\MetadataInterface;
use Sylius\Component\User\Repository\UserRepositoryInterface;
use Sylius\Component\User\Security\PasswordUpdaterInterface;
use Symfony\Component\Messenger\Handler\MessageHandlerInterface;
use Webmozart\Assert\Assert;
final class ResetPasswordHandler implements MessageHandlerInterface
{
private UserRepositoryInterface $userRepository;
private MetadataInterface $metadata;
private PasswordUpdaterInterface $passwordUpdater;
public function __construct(
UserRepositoryInterface $userRepository,
MetadataInterface $metadata,
PasswordUpdaterInterface $passwordUpdater
) {
$this->userRepository = $userRepository;
$this->metadata = $metadata;
$this->passwordUpdater = $passwordUpdater;
}
public function __invoke(ResetPassword $command): void
{
/** @var ShopUserInterface|null $user */
$user = $this->userRepository->findOneBy(['passwordResetToken' => $command->resetPasswordToken]);
Assert::notNull($user, 'No user found with reset token: ' . $command->resetPasswordToken);
$resetting = $this->metadata->getParameter('resetting');
$lifetime = new \DateInterval($resetting['token']['ttl']);
if (!$user->isPasswordRequestNonExpired($lifetime)) {
throw new \InvalidArgumentException('Password reset token has expired');
}
if ($command->resetPasswordToken !== $user->getPasswordResetToken()) {
throw new \InvalidArgumentException('Password reset token does not match.');
}
$user->setPlainPassword($command->newPassword);
$this->passwordUpdater->updatePassword($user);
$user->setPasswordResetToken(null);
}
}
```
And register it in container:
```yaml
App\CommandHandler\Account\ResetPasswordHandler:
arguments:
- '@sylius.repository.shop_user'
- !service
class: Sylius\Component\Resource\Metadata\MetadataInterface
factory: [ '@sylius.resource_registry', 'get' ]
arguments:
- 'sylius.shop_user'
- '@sylius.security.password_updater'
tags:
- { name: messenger.message_handler, bus: sylius.command_bus }
- { name: messenger.message_handler, bus: sylius_default.bus }
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [security@sylius.com](mailto:security@sylius.com)
|
{'CVE-2022-24743'}
|
2022-03-15T21:48:34Z
|
2022-03-14T22:30:46Z
|
HIGH
| null |
{'CWE-613'}
|
{'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24743'}
| null |
Packagist
|
GHSA-q7rv-6hp3-vh96
|
Improper Input Validation in guzzlehttp/psr7
|
### Impact
In proper header parsing. An attacker could sneak in a new line character and pass untrusted values.
### Patches
The issue is patched in 1.8.4 and 2.1.1
### Workarounds
There are no known workarounds.
|
{'CVE-2022-24775'}
|
2022-03-25T19:26:33Z
|
2022-03-25T19:26:33Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/guzzle/psr7', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
| null |
Packagist
|
GHSA-pvgf-mrr4-cw7r
|
Cross-Site Request Forgery in ForkCMS
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.
|
{'CVE-2020-23960'}
|
2021-04-06T22:22:33Z
|
2021-05-06T18:53:09Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/forkcms/forkcms/pull/3123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23960', 'https://www.fork-cms.com/blog/detail/fork-5.8.3-released'}
| null |
Packagist
|
GHSA-hq5m-mqmx-fw6m
|
Privilege escalation via form generator
|
### Impact
It is possible for untrusted users to gain administrator rights with the form generator.
Installations are only affected if there are untrusted back end users with access to the form generator.
### Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7.
### Workarounds
Disable the form generator or disable the login for untrusted back end users.
### References
https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2021-37627'}
|
2021-08-23T16:52:36Z
|
2021-08-23T19:41:22Z
|
HIGH
| null |
{'CWE-269'}
|
{'https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37627', 'https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html'}
| null |
Packagist
|
GHSA-36fm-v9wv-56jf
|
Cross-site Scripting in OpenCart
|
OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.
|
{'CVE-2020-10596'}
|
2021-05-04T21:30:17Z
|
2021-05-06T18:54:04Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10596', 'https://github.com/opencart/opencart/issues/7810', 'http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html'}
| null |
Packagist
|
GHSA-wjfq-88q2-r34j
|
Unhandled exception when decoding form response JSON
|
### Impact
When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.
An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash.
### Patches
56fe71d939c38fe14e18a31a673a9331bcc0e4ca
### Workarounds
A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`.
Note that this requires copying the body of the function to a plugin, since the function is currently private.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-01-21T21:16:09Z
|
2022-01-21T23:02:14Z
|
HIGH
| null | null |
{'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
| null |
Packagist
|
GHSA-q3j3-w37x-hq2q
|
Webcache Poisoning in symfony/http-kernel
|
Description
-----------
When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks.
In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue.
Resolution
----------
Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3.
Credits
-------
We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
|
{'CVE-2021-41267'}
|
2021-11-25T00:18:27Z
|
2021-11-24T20:04:25Z
|
MODERATE
| null |
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41267', 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}
| null |
Packagist
|
GHSA-wjx8-cgrm-hh8p
|
Unrestricted file uploads in Contao
|
### Impact
A back end user with access to the form generator can upload arbitrary files and execute them on the server.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.
### References
https://contao.org/en/security-advisories/unrestricted-file-uploads.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2019-19745'}
|
2021-08-19T16:10:14Z
|
2019-12-17T22:53:10Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml', 'https://contao.org/en/security-advisories/unrestricted-file-uploads.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745', 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p', 'https://contao.org/en/news.html'}
| null |
Packagist
|
GHSA-r5mf-q76q-f2xq
|
Cross-site scripting in Centreon
|
Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.
|
{'CVE-2021-27676'}
|
2021-05-28T22:24:47Z
|
2021-06-08T20:13:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27676', 'https://github.com/centreon/centreon/pull/9587', 'http://centreon.com', 'https://github.com/centreon/centreon/releases/tag/20.10.7'}
| null |
Packagist
|
GHSA-6mh3-j5r5-2379
|
Cross-Site Scripting in Query Generator & Query View
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.5)
### Problem
Failing to properly encode error messages, the components _QueryGenerator_ and _QueryView_ are vulnerable to both reflected and persistent cross-site scripting. A valid backend user account having administrator privileges is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-010](https://typo3.org/security/advisory/typo3-core-sa-2021-010)
|
{'CVE-2021-32668'}
|
2021-08-31T21:22:46Z
|
2021-07-22T19:36:58Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-6mh3-j5r5-2379', 'https://github.com/TYPO3/typo3', 'https://typo3.org/security/advisory/typo3-core-sa-2021-010', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32668', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-6mh3-j5r5-2379'}
| null |
Packagist
|
GHSA-cx2r-mf6x-55rx
|
Stored XSS with custom URLs in PrestaShop module ps_linklist
|
### Impact
Stored XSS when using custom URLs.
### Patches
The problem is fixed in 3.1.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
|
{'CVE-2020-5273'}
|
2021-10-08T22:31:21Z
|
2021-10-12T16:01:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx'}
| null |
Packagist
|
GHSA-pm3v-qxf6-fgxv
|
Cross-site Scripting in pimcore
|
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
|
{'CVE-2022-0285'}
|
2022-01-27T18:32:20Z
|
2022-01-21T18:08:43Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c'}
| null |
Packagist
|
GHSA-8vq6-5f66-hp3r
|
Logic error in dolibarr/dolibarr
|
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
|
{'CVE-2022-0746'}
|
2022-03-07T13:41:24Z
|
2022-02-26T00:00:44Z
|
MODERATE
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0746', 'https://github.com/dolibarr/dolibarr', 'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
| null |
Packagist
|
GHSA-wwgf-3xp7-cxj4
|
Potentially sensitive data exposure in Symfony Web Socket Bundle
|
### Impact
Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive.
### Patches
In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails.
### Workarounds
Upgrade to 1.10.4, 2.6.1, and 3.3.0
Note, the 1.x branch is considered end of support as of July 1, 2020.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle)
| null |
2021-09-22T20:22:02Z
|
2020-07-07T16:33:45Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}
| null |
Packagist
|
GHSA-3756-hwhv-qw58
|
Cross site scripting in francoisjacquet/rosariosis
|
A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.
|
{'CVE-2021-44566'}
|
2022-03-04T21:38:43Z
|
2022-02-25T00:01:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44566', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/81886abb45a32e802151660de674f084afaef3aa', 'https://gitlab.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/259', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43'}
| null |
Packagist
|
GHSA-243q-g9j3-qf6r
|
non-admin users can create integration role with administrator role
|
### Impact
non-admin users can create integration role with administrator role
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null |
2021-06-24T19:31:03Z
|
2021-06-28T18:21:01Z
|
MODERATE
| null | null |
{'https://github.com/shopware/platform/security/advisories/GHSA-243q-g9j3-qf6r'}
| null |
Packagist
|
GHSA-xxq4-3742-3h28
|
Generation of Error Message Containing Sensitive Information in microweber
|
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
|
{'CVE-2022-0504'}
|
2022-02-09T22:23:35Z
|
2022-02-09T00:00:31Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.