ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist
|
GHSA-wgjx-hm34-qgf7
|
SQL injection in Centreon
|
SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php.
|
{'CVE-2019-16194'}
|
2021-08-19T17:12:52Z
|
2020-02-11T20:36:04Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://github.com/centreon/centreon/releases', 'https://github.com/centreon/centreon/pull/7862', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}
| null |
Packagist
|
GHSA-592v-7frm-h44q
|
Cross-site scripting in LavaLite-CMS
|
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
|
{'CVE-2020-23700'}
|
2021-07-13T15:53:43Z
|
2021-09-08T17:25:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23700', 'https://github.com/LavaLite/cms/issues/319'}
| null |
Packagist
|
GHSA-4qwp-7c67-jmcc
|
Unauthenticated remote code execution in Ignition
|
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
|
{'CVE-2021-3129'}
|
2021-03-23T00:13:45Z
|
2021-03-29T20:23:46Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/facade/ignition/pull/334', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://www.ambionics.io/blog/laravel-debug-rce'}
| null |
Packagist
|
GHSA-4gwh-2pqx-f5cc
|
Cross-site Scripting in LibreNMS
|
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
|
{'CVE-2021-44277'}
|
2021-12-03T15:17:38Z
|
2021-12-03T20:48:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44277', 'https://github.com/librenms/librenms/pull/13554', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
| null |
Packagist
|
GHSA-39wj-j3jc-858m
|
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
|
### Impact
This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.
This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org
|
{'CVE-2020-35124'}
|
2021-01-19T20:43:12Z
|
2021-01-19T20:43:56Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://forum.mautic.org/c/announcements/16', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://packagist.org/packages/mautic/core'}
| null |
Packagist
|
GHSA-79gr-58r3-pwm3
|
Forbid serializing AbstractAdapter and TagAwareAdapter instances
|
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.
|
{'CVE-2019-18889'}
|
2021-08-19T15:17:25Z
|
2019-12-02T18:07:16Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889', 'https://symfony.com/cve-2019-18889'}
| null |
Packagist
|
GHSA-cxvr-r92m-q9hw
|
XSS in Dolibarr
|
Dolibarr before 11.0.4 allows XSS.
|
{'CVE-2020-13094'}
|
2021-08-25T21:14:11Z
|
2020-05-21T21:08:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html', 'https://github.com/Dolibarr/dolibarr/blob/11.0.4/ChangeLog', 'https://github.com/Dolibarr/dolibarr/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13094', 'https://www.dolibarr.org/dolibarr-erp-crm-11-0-4-maintenance-release-for-branch-11-0-is-available.php'}
| null |
Packagist
|
GHSA-33gc-6cw9-w3g4
|
Deserialization of Untrusted Data in topthink/framework
|
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
|
{'CVE-2021-36564'}
|
2021-12-08T20:30:33Z
|
2021-12-10T20:23:19Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36564', 'https://github.com/top-think/framework/issues/2559'}
| null |
Packagist
|
GHSA-cqcc-mm6x-vmvw
|
Persistent Cross-site Scripting vulnerability in PrivateBin
|
In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present since attachments with image preview got introduced in v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy.
As a consequence, we have mitigated the vulnerability in the preview and urge server administrators to either **upgrade** to a version with the fix or to ensure the content security policy of their instance is set correctly, ideally both. Additionally, we expanded our [directory listing tool with a checking mechanism](https://privatebin.info/directory/check) and **highly suggest server administrators to check their instance there** and, should there be a warning regarding the content security policy **adjust the CSP to our suggested one**, as it is shown in the configuration preset.
## Proof of concept
The vulnerability can be triggered as following:
1. Create the following SVG as a file:
```svg
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
alert(document.domain);
</script>
</svg>
```
2. Upload it as an attachment to a PrivateBin instance that has attachments enabled and hasn't set the recommended content security policy (in particular, one that has either no content security policy set or that allows `*` or `blob:` as a `script-src`).
3. Open the paste. (In a real attack scenario this would be done by the victim.)
4. The SVG is rendered safely as a preview, and script isn't yet executed.
5. Now (depending on your device) right-click or long tap on the image and open it in a new tab.
6. Now a `blob:` URI opens in a new tab with the image and the modal is shown, therefore the script got executed.
## Impact
We tried to reproduce the vulnerability and in our assessment, we found out the following:
1. Any users who use our recommended _Content Security Policy_ (CSP), even older, less strict ones, are **not affected** by this vulnerability, if a [CSP compatible browser](https://caniuse.com/contentsecuritypolicy) is used. All the browsers we tested with did pass on the CSP to the new tab that is opened when viewing the SVG by itself.
As PrivateBin ships with a [built-in CSP](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader), we consider this a strong defence in depth against these and related issues. That said, we think the CSP should only be the last layer of defence and as such, we decided to still apply further mitigations for this security issue.
2. Instances that do not have attachments enabled, are not affected. Even when attachments are uploaded using a third-party client, they can't be rendered when the administrator disables them (the HTML element that they would render in isn't present and before 1.4 this caused an error, we now catch the error and only display the paste text) and thus potential exploits in the attachment file do not apply.
3. The inline preview (step 4 above) does _not_ execute the script, because [browsers explicitly restrict SVGs if the they are is embedded in an `img` tag](https://developer.mozilla.org/en-US/docs/Web/SVG/SVG_as_an_Image#restrictions) to prevent such security issues in images. Thus, [SVGs in `img` tags itself can be considered safe](https://www.w3.org/TR/CSP2/#which-policy-applies).
However, when the user opens the SVG in a new tab, this browser security feature is circumvented. That's why the exploit steps above explain to open the SVG in a new tab. That being said, the impact of the vulnerability is reduced by two factors:
1. The attack explicitly requires **user-interaction**, i.e. the user has to be tricked into opening the preview in a new tab for some reason. This could realistically be achieved with some social engineering: The markdown formatted text part of the paste could include such an instruction as a big, bold title, or the SVG could be very large and have very small text, which the user might want to zoom into, in order to read.
2. Potential exploit code can only run in a new tab. It still has the same origin (as can be seen in the PoC above, because the domain/origin the script is running on, is shown). However, though, sensitive information like the paste content, potential comments or encryption key (in the URL) is not accessible to the attacker as the context is now a blob-URL – and would anyway consist mostly of things the attacker initially created itself.
That said, [the same origin policy applies](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy) and thus, what an attacker could do is read e.g. cookies and local storage data saved in the same origin. As PrivateBin itself does not use any of that, the impact of this vulnerability is limited. However, as PrivateBin is a software for self-hosting, it cannot be excluded that other services run in the same origin (e.g. on the same domain). That's why server administrators may need to evaluate the impact of running arbitrary JavaScript code on their domain/origin where PrivateBin is hosted by themselves.
To summarize, this shows a fairly limited impact, given even if the CSP had not caught the issue, the user still needs to interact with the page and the exploit code cannot access or exfiltrate any data of the PrivateBin instance.
**Note:** However, take our assessment only as a basis for your own assessment. As explained, depending on your environment, the actual risk may vary if you are hosting other services on the same domain as PrivateBin.
As for the metrics, the impact assessment we have done with [CVSS v3.1](https://nvd.nist.gov/vuln-metrics/cvss) results in this:
[AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X&version=3.1)
### Real-life impact
We found two affected instances in our instance lists (wiki, directory) that did not serve a correct Content Security Policy header, had attachments enabled and thus are vulnerable to this attack. We didn't manage to get into contact with the administrators of these sites, though.
In addition to that, we found that multiple instances do seem to either strip our CSP or have it changed to an unsafe setting and have thus expanded our directory service to verify whether our recommend CSP is used or not. (see below)
We have no reports that indicate this vulnerability was or is being actively exploited at the time of this report.
## Patches
To fix the problem, we took the following measures (in no particular order):
* We apply [DOMpurify](https://github.com/cure53/DOMPurify/) (a library we already use to sanitize user-submitted HTML via the Markdown format) to the SVG preview, too. It strips script tags and other uncommon security-relevant and potentially malicious tags/properties from the SVG file.
So whether you open the SVG in a new tab or not and whether CSP is present and enabled or not does not matter any more, as the displayed SVG is sanitized.
* As a further defence in depth mechanism we now send the CSP both as an HTTP header, as well as a meta tag. This protects instance with mis-configured web servers, CDNs, proxy or similar, from stripping or breaking the CSP headers, as they still get the CSP inside of the HTML content itself. Please note though, that the [meta tag approach is not as strong as the HTTP header approach](https://content-security-policy.com/examples/meta/) and should thus only be considered as a fallback.
* The [PrivateBin Directory](https://privatebin.info/) now also scans whether the recommend Content-Security-Policy header is used on a given instance. If you do not want to have your website appear in the list, but check it manually [you can use a separate check page](https://privatebin.info/directory/check) there.
The code-changes in PrivateBin can be found in https://github.com/PrivateBin/PrivateBin/pull/906.
**Note:** Please note that we explicitly chose to _not_ apply _DOMPurify_ if you download the (SVG) attachment with the download button. Subsequently, if a user would manually opens the downloaded SVG in the browser, it will be opened from the `file://` protocol and thus from a [different origin](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy), so all reference to the download location is lost and no more security risk is associated with that, than opening any website or local HTML file. Thus, the SVG file with stay intact in it's original form, if you download the attachment.
We consider the execution of code from attachments outside of the PrivateBin instance's context to be out of scope to mitigate (i.e. malware in executables, office documents macros, PDF scripts), as all of these require client side mitigations to be applied to all such downloaded file types, independent on where they get downloaded from.
## Workarounds
We strongly recommend you to upgrade to our latest release, especially as we also upgraded outdated and potential vulnerable libraries (see below). However, here are two workarounds that may help you to mitigate this vulnerability:
* Update the [CSP in your configuration file](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader) to the latest recommended settings and check that it isn't getting reverted or overwritten by your web server, reverse proxy or CDN, i.e. using [our offered check service](https://privatebin.info/directory/check).
* Deploying PrivateBin on a separate domain may limit the scope of the vulnerability to PrivateBin itself and thus, as described in the “Impact” section, effectively prevent any damage by the vulnerability to other resources you are hosting.
* As explained in the impact assessment, disabling attachments also prevents this issue.
## References
We highly encourage server administrators and others involved with the PrivateBin project to read-up on how Content-Security-Policies work, especially should you consider to manually adjust it:
* https://content-security-policy.com/
* https://developer.mozilla.org/docs/Web/HTTP/CSP
* https://developers.google.com/web/fundamentals/security/csp/
Also please note that if multiple headers are set (as e.g. done via our now introduced meta tag) [browsers should apply the most restrictive set of the policies](https://stackoverflow.com/a/51153816/5008962), [as per the CSP specification](https://www.w3.org/TR/CSP2/#enforcing-multiple-policies).
## For more information
Please notice we also upgraded [jQuery](https://github.com/PrivateBin/PrivateBin/pull/880) that was reported to us as being vulnerable both by [our automated container security scanning](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issue-1006943396) as well as [by users](https://github.com/PrivateBin/PrivateBin/issues/864).
By doing so, we also updated all [other dependencies we use](https://github.com/PrivateBin/PrivateBin/pull/888). Our tooling identified the following vulnerabilities in jQuery:
* CVE-2020-11023
* CVE-2020-11022
In [a limited assessment about these when we were made aware of them](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issuecomment-928261418) we could not find any immediate risk, but nevertheless, we encourage users to upgrade to be on the safe side.
Finally, we also [upgraded zlib](https://github.com/PrivateBin/PrivateBin/pull/909) to address CVE-2018-25032.
## Timeline
* 2022-02-22 – Initial contact by reporter.
* 2022-02-25 – Reporter sends in a detailed report.
* 2022-02-26 – Report gets reviewed, initial findings around the content security get shared and reporter withdraws report.
* 2022-04-09 – Vulnerability details published.
## Credits
This vulnerability was reported by Ian Budd, [Nethemba s.r.o](https://www.nethemba.com/), which we'd like to thank for that.
In general, we'd like to thank everyone reporting issues and potential vulnerabilities to us.
If you think you have found a vulnerability or potential security risk, [we'd kindly ask you to follow our security policy](https://github.com/PrivateBin/PrivateBin/blob/master/SECURITY.md) and report it to us. We then assess the report and will take the actions we deem necessary to address it.
|
{'CVE-2022-24833'}
|
2022-04-20T16:29:00Z
|
2022-04-12T20:45:22Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/PrivateBin/PrivateBin', 'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24833'}
| null |
Packagist
|
GHSA-xj7h-g7rh-gjcw
|
Cross-site Scripting in Subrion CMS
|
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template.
|
{'CVE-2020-18324'}
|
2022-03-15T00:23:04Z
|
2022-03-05T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hamm0nz/CVE-2020-18324', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18324', 'https://github.com/intelliants/subrion'}
| null |
Packagist
|
GHSA-hf4q-52x6-4p57
|
Unrestricted file upload leads to stored cross-site scripting in Microweber
|
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
|
{'CVE-2022-0906'}
|
2022-03-28T22:23:29Z
|
2022-03-11T00:02:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906', 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8', 'https://github.com/microweber/microweber'}
| null |
Packagist
|
GHSA-v567-q267-phpg
|
pimcore is vulnerable to Cross-site Scripting
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2022-0257'}
|
2022-01-25T20:49:25Z
|
2022-01-21T23:50:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257', 'https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6', 'https://github.com/pimcore/pimcore'}
| null |
Packagist
|
GHSA-32hw-3pvh-vcvc
|
XSS vulnerability on password reset page
|
### Impact
For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2021-27909'}
|
2021-08-30T18:03:34Z
|
2021-09-01T18:40:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mautic/mautic/security/advisories/GHSA-32hw-3pvh-vcvc', 'https://github.com/mautic/mautic', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27909'}
| null |
Packagist
|
GHSA-3j78-7m59-r7gv
|
Private data exposure via REST API in BuddyPress
|
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed.
This has been patched in version 5.1.2.
|
{'CVE-2020-5244'}
|
2021-01-08T20:29:11Z
|
2020-02-24T17:18:26Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://buddypress.org/2020/01/buddypress-5-1-2/', 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244', 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv'}
| null |
Packagist
|
GHSA-q73m-3q7r-fpf7
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
|
{'CVE-2022-0957'}
|
2022-03-29T15:46:18Z
|
2022-03-16T00:00:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21', 'https://github.com/star7th/showdoc/pull/1632', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957'}
| null |
Packagist
|
GHSA-hrf4-hcpc-3345
|
Denial of service in microweber
|
Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or max 1000 characters as a workaround.
|
{'CVE-2022-0961'}
|
2022-03-25T17:09:24Z
|
2022-03-16T00:00:48Z
|
HIGH
| null |
{'CWE-190'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961', 'https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436'}
| null |
Packagist
|
GHSA-84px-q68r-2fc9
|
Privilege escalation in the Sulu Admin panel
|
### Impact
Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction.
### Patches
The versions have been patched in 2.2.18, 2.3.8 and 2.4.0.
### Workarounds
Patching the ProfileController of affected sulu versions yourself by overwriting it.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-43835'}
|
2021-12-15T22:27:38Z
|
2021-12-15T22:55:16Z
|
HIGH
| null |
{'CWE-269'}
|
{'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a', 'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9', 'https://github.com/sulu/sulu', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835'}
| null |
Packagist
|
GHSA-75c5-f4gw-38r9
|
Multiple vulnerabilities through filename manipulation in Archive_Tar
|
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
|
{'CVE-2020-28949'}
|
2021-09-20T20:26:56Z
|
2021-04-22T16:20:59Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28949', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.debian.org/security/2020/dsa-4817', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://github.com/pear/Archive_Tar/issues/33', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar'}
| null |
Packagist
|
GHSA-vcgf-vmpc-ph79
|
Improper Access Control in microweber
|
Improper Access Control in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0277'}
|
2022-01-27T18:30:40Z
|
2022-01-21T18:06:16Z
|
MODERATE
| null |
{'CWE-284', 'CWE-269'}
|
{'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277', 'https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316', 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
| null |
Packagist
|
GHSA-2cjf-w7c4-fhf6
|
Cross-site Scripting in Beanstalk console
|
Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting.
|
{'CVE-2022-0539'}
|
2022-02-11T15:04:27Z
|
2022-02-10T00:00:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539', 'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694', 'https://github.com/ptrofimov/beanstalk_console'}
| null |
Packagist
|
GHSA-x79j-wgqv-g8h2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form
|
### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)
|
{'CVE-2021-21358'}
|
2021-03-29T18:02:42Z
|
2021-03-23T01:54:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://packagist.org/packages/typo3/cms-form', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21358', 'https://typo3.org/security/advisory/typo3-core-sa-2021-004', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2'}
| null |
Packagist
|
GHSA-2f2w-349x-vrqm
|
Cross-site scripting (XSS) from field and configuration text displayed in the Panel
|
On Saturday, @hdodov reported that the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks.
We used his report as an opportunity to find and fix XSS issues related to dynamic site content throughout the Panel codebase.
### Impact
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
Visitors without Panel access can only use this attack vector if your site allows changing site data from a frontend form (for example user self-registration or the creation of pages from a contact or other frontend form). If you validate or sanitize the provided form data, you are already protected against such attacks by external visitors.
### Patches
[Kirby 3.5.7](https://github.com/getkirby/kirby/releases/tag/3.5.7) contains patches for the following issues we found during our investigation:
- Some translated error and info messages contain placeholders to dynamically insert information like page titles or filenames. While the translation strings are allowed to contain HTML formatting, the dynamic data needs to be protected against XSS attacks. Kirby 3.5.7 now escapes the dynamic data.
- Our `Box` component used to display information for the user supports HTML output for specific use-cases. We found out that the dialogs used in the `files`, `pages` and `users` fields as well as the `fields` section used it to display raw exception or error messages. These messages are now escaped.
- The users and settings views display user and language data using the `ListItem` component that supports HTML. We now escape the dynamic data before it is passed to the `ListItem` component.
- Some of our sections and fields support HTML for their `text`, `help` and/or `info` properties. This allows custom formatting from the blueprint, but also caused the original issue reported to us that allowed to inject HTML code from the content itself. Kirby 3.5.7 now escapes the default `text` displayed by the `files` and `pages` sections (filename/page title), the `files`, `pages` and `users` fields (filename/page title/username) and by query-based `checkboxes`, `radio`, `tags` and `multiselect` fields (default text depending on the used query).
**Note:** Custom `text`, `help` and `info` queries in blueprints are *not* escaped in 3.5.7. We support HTML in these properties because there are valid use-cases for custom formatting. However there can still be XSS vulnerabilities depending on your use of these properties. In Kirby 3.6 we will provide a new feature that will make it much easier to control whether you want to allow HTML from query placeholders.
|
{'CVE-2021-32735'}
|
2021-10-21T14:13:46Z
|
2021-07-02T19:18:43Z
|
HIGH
| null |
{'CWE-80'}
|
{'https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm', 'https://github.com/getkirby/kirby', 'https://github.com/getkirby/kirby/releases/tag/3.5.7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32735'}
| null |
Packagist
|
GHSA-qfhg-m6r8-xxpj
|
Incorrect Authorization in Drupal core
|
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
|
{'CVE-2020-13676'}
|
2022-02-23T16:04:57Z
|
2022-02-12T00:00:46Z
|
MODERATE
| null |
{'CWE-863', 'CWE-284'}
|
{'https://github.com/drupal/core', 'https://www.drupal.org/sa-core-2021-009', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13676'}
| null |
Packagist
|
GHSA-f768-8pvq-mm6r
|
Business Logic Errors in dolibarr/dolibarr
|
Dolibarr 14.0.5 and prior versions are vulnerable to Business Logic Errors.
|
{'CVE-2022-0414'}
|
2022-02-07T21:10:24Z
|
2022-02-01T22:01:47Z
|
MODERATE
| null | null |
{'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0414', 'https://github.com/dolibarr/dolibarr', 'https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f'}
| null |
Packagist
|
GHSA-hgjr-632x-qpp3
|
Cross-site scripting vulnerability in file upload
|
There is a cross-site scripting vulnerability in file upload on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
### Target
baserCMS 4.5.1 and earlier versions
### Vulnerability
Execution of malicious JavaScript code may alter the display of the page or leak cookie information.
### Countermeasures
Update to the latest version of baserCMS
Please refer to the next page for details.
https://basercms.net/security/JVN_14134801
|
{'CVE-2021-39136'}
|
2021-08-26T15:08:57Z
|
2021-08-30T16:18:59Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136', 'https://basercms.net/security/JVN_14134801', 'http://jvn.jp/en/jp/JVN14134801/index.html', 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/baserproject/basercms'}
| null |
Packagist
|
GHSA-9cq5-xgg4-x477
|
SQL Injection in showdoc
|
Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository.
|
{'CVE-2022-0362'}
|
2022-02-03T21:37:09Z
|
2022-01-27T00:01:15Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb', 'https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0362', 'https://github.com/star7th/showdoc'}
| null |
Packagist
|
GHSA-g585-j55v-38h7
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
|
{'CVE-2022-0966'}
|
2022-03-29T18:40:41Z
|
2022-03-16T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0966', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
Packagist
|
GHSA-38m9-3vg4-rwvp
|
Cross-site Scripting in microweber
|
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0678'}
|
2022-02-23T19:43:59Z
|
2022-02-20T00:00:32Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0678', 'https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0', 'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8', 'https://github.com/microweber/microweber'}
| null |
Packagist
|
GHSA-fx3v-553x-3c4q
|
Stored XSS by authenticated backend user with access to upload files
|
### Impact
Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed.
### Patches
Issue has been patched in Build 469 (v1.0.469) & v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469 or v1.1.0.
### References
Reported by [Hoan Hoang](https://github.com/hoanhp)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1107" alt="Screen Shot 2020-10-10 at 1 47 49 PM" src="https://user-images.githubusercontent.com/7253840/95663787-378f2b80-0aff-11eb-8dfc-b97d162939da.png">
|
{'CVE-2020-15249'}
|
2021-03-04T18:24:54Z
|
2020-11-23T19:47:59Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15249', 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q'}
| null |
Packagist
|
GHSA-68jc-v27h-vhmw
|
Unrestricted Upload of File with Dangerous Type in Drupal core.
|
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
|
{'CVE-2020-13671'}
|
2022-01-04T19:47:28Z
|
2021-10-12T16:28:25Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://github.com/drupal/core', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13671', 'https://www.drupal.org/sa-core-2020-012'}
| null |
Packagist
|
GHSA-c442-3278-rhrg
|
Unrestricted File Upload in ShowDoc v2.9.5
|
Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'.
|
{'CVE-2021-36440'}
|
2021-09-16T19:26:04Z
|
2021-09-09T17:08:46Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36440', 'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/issues/1406'}
| null |
Packagist
|
GHSA-pwrf-q7h8-jjr7
|
Authorization Bypass Through User-Controlled Key in Bagisto
|
In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers.
|
{'CVE-2019-16403'}
|
2021-05-10T17:22:09Z
|
2019-11-08T20:06:24Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://github.com/bagisto/bagisto/issues/749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'}
| null |
Packagist
|
GHSA-r37h-j483-cjjm
|
Improper rate limiting in Koel
|
Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
|
{'CVE-2021-33563'}
|
2021-06-04T18:50:20Z
|
2021-06-01T21:38:20Z
|
HIGH
| null |
{'CWE-799', 'CWE-916'}
|
{'https://huntr.dev/bounties/1-other-koel/koel/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563', 'https://github.com/koel/koel/releases/tag/v5.1.4'}
| null |
Packagist
|
GHSA-w6rp-4vj7-v2m8
|
Missing Authorization in DayByDay CRM
|
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
|
{'CVE-2022-22111'}
|
2022-01-10T21:46:05Z
|
2022-01-08T00:31:49Z
|
HIGH
| null |
{'CWE-862'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22111'}
| null |
Packagist
|
GHSA-w6jr-wj64-mc9x
|
Deserialization of Untrusted Data in Codeigniter4
|
### Impact
Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4.
Remote attackers may inject auto-loadable arbitrary objects with this vulnerability,
and possibly execute existing PHP code on the server.
We are aware of a working exploit, which can lead to SQL injection.
### Patches
Upgrade to v4.1.6 or later.
### Workarounds
Do not use:
- `old()` and form_helper
- `RedirectResponse::withInput()` and `redirect()->withInput()`
### References
- [PHP Object Injection | OWASP](https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-21647'}
|
2022-01-06T19:32:43Z
|
2022-01-06T22:52:41Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x', 'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5', 'https://github.com/codeigniter4/CodeIgniter4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647'}
| null |
Packagist
|
GHSA-wf98-vxv9-jqfv
|
XSS Injection Vulnerability
|
### Impact
Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied.
### Patches
This has been patched in Craft 3.7.29.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18
### For more information
If you have any questions or comments about this advisory, email us at [support@craftcms.com](mailto:support@craftcms.com)
----------
Credits: https://github.com/noobpk
| null |
2022-04-05T18:31:51Z
|
2022-04-05T18:31:51Z
|
LOW
| null | null |
{'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv', 'https://github.com/craftcms/cms'}
| null |
Packagist
|
GHSA-4g29-fccr-p59w
|
Reflected Cross-site Scripting in Shopware storefront
|
### Impact
Not-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
{'CVE-2022-24873'}
|
2022-04-28T20:59:24Z
|
2022-04-28T20:59:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.shopware.com/en/changelog-sw5/#5-7-9', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873', 'https://github.com/shopware/shopware', 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w'}
| null |
Packagist
|
GHSA-25fx-mxc2-76g7
|
Unauthorized access to Credit card form exposing payer name and not requiring 3DS
|
### Impact
URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name.
Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.
### Patches
The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1**
### Workarounds
One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in Sylius/PayPalPlugin issues
- Email us at security at sylius dot com
|
{'CVE-2021-41120'}
|
2021-10-05T21:12:27Z
|
2021-10-06T17:49:11Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7', 'https://github.com/Sylius/PayPalPlugin'}
| null |
Packagist
|
GHSA-5v44-7647-xfw9
|
Blind SQL injection in PrestaShop productcomments module
|
### Impact
An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.
### Patches
The problem is fixed in 4.2.1
|
{'CVE-2020-26248'}
|
2022-01-07T16:07:46Z
|
2021-01-20T21:33:53Z
|
LOW
| null |
{'CWE-89'}
|
{'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa', 'https://packagist.org/packages/prestashop/productcomments', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248', 'https://github.com/PrestaShop/productcomments', 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9', 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html'}
| null |
Packagist
|
GHSA-73q9-7pwj-gm46
|
icecoder is vulnerable to Cross-site Scripting
|
icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3862'}
|
2022-01-19T14:28:08Z
|
2022-01-21T23:46:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601', 'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763', 'https://github.com/icecoder/icecoder', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3862'}
| null |
Packagist
|
GHSA-3v43-877x-qgmq
|
Moderate severity vulnerability that affects league/commonmark
|
## CVE-2019-10010
### Impact
In `league/commonmark` 0.18.2 and below, malicious users can insert double-encoded HTML entities into their Markdown like this:
```md
[XSS](javascript&colon;alert%28'XSS'%29)
```
This library would (correctly) unescape the `&` entity to `&` during the parsing step. However, **the renderer step would fail to properly re-escape the resulting `:` string**, thus producing the following malicious HTML output:
```html
<p><a href="javascript:alert('XSS')">XSS</a></p>
```
Browsers would interpret `:` as a `:` character and allow the JS to be executed when the link is clicked.
This vulnerability was present in the upstream library this project was forked from and therefore exists in all prior versions of `league/commonmark`.
### Solution
The new [0.18.3](https://github.com/thephpleague/commonmark/releases/tag/0.18.3) release mirrors [the fix made upstream](https://github.com/commonmark/commonmark.js/commit/c89b35c5fc99bdf1d2181f7f0c9fcb8a1abc27c8) - we no longer attempt to preserve entities when rendering HTML attributes like `href`, `src`, `title`, etc.
The `$preserveEntities` parameter of `Xml::escape()` is therefore no longer used internally, so it has been deprecated and marked for removal in the next major release (0.19.0).
### Credits
- Mohit Fawaz for identifying the issue
- Sebastiaan Knijnenburg and Ross Tuck for responsibly disclosing/relaying the issue
- John MacFarlane for investigating it and implementing the upstream fix we mirrored here
### References
- https://nvd.nist.gov/vuln/detail/CVE-2019-10010
- https://github.com/thephpleague/commonmark/releases/tag/0.18.3
- https://github.com/thephpleague/commonmark/issues/353
- https://github.com/FriendsOfPHP/security-advisories/blob/master/league/commonmark/CVE-2019-10010.yaml
|
{'CVE-2019-10010'}
|
2021-08-31T21:29:59Z
|
2019-09-17T22:47:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/thephpleague/commonmark/releases/tag/0.18.3', 'https://github.com/thephpleague/commonmark/security/advisories/GHSA-3v43-877x-qgmq', 'https://github.com/advisories/GHSA-3v43-877x-qgmq', 'https://github.com/thephpleague/commonmark/', 'https://github.com/thephpleague/commonmark/issues/353', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10010'}
| null |
Packagist
|
GHSA-p7v4-gm6j-cw9m
|
XSS in Mautic
|
### Impact
This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed.
This vulnerability was reported by Dardan Prebreza at Bishop Fox.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### References
https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org
|
{'CVE-2021-3142'}
|
2021-01-29T20:31:59Z
|
2021-01-29T20:51:20Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/mautic/mautic/releases/tag/3.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3142', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3', 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m', 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}
| null |
Packagist
|
GHSA-pjj4-jjgc-h3r8
|
Authenticated remote code execution
|
### Impact
Authenticated remote code execution using plugin manager without ACL permissions.
### Patches
We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
| null |
2021-03-12T22:28:01Z
|
2021-03-12T23:09:24Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021', 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}
| null |
Packagist
|
GHSA-ppfm-rj6p-38q6
|
Improper Authorization in librenms
|
Improper Authorization in Packagist librenms/librenms prior to 22.2.0.
|
{'CVE-2022-0587'}
|
2022-02-24T12:14:14Z
|
2022-02-16T00:01:53Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0587', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}
| null |
Packagist
|
GHSA-h58v-g3q6-q9fx
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form.
Only admin users are affected and only admin users can create tags.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with Version 1.6.42.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Create a custom request listener to avoid that this kind of tags are created.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-41169'}
|
2021-10-21T21:33:34Z
|
2021-10-22T16:20:53Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41169', 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445', 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx', 'https://github.com/sulu/sulu'}
| null |
Packagist
|
GHSA-6whf-q6p5-84wg
|
Improper Access Control in Webauthn Framework
|
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
|
{'CVE-2021-38299'}
|
2021-10-06T13:23:34Z
|
2021-09-29T17:16:07Z
|
CRITICAL
| null |
{'CWE-863'}
|
{'https://github.com/web-auth/webauthn-framework', 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4', 'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/', 'https://github.com/web-auth/webauthn-framework/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299', 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'}
| null |
Packagist
|
GHSA-4h44-w6fm-548g
|
Potential Remote Code Execution in TYPO3 with mediace extension
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges.
### Solution
In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository:
* https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/
* https://packagist.org/packages/friendsoftypo3/mediace#7.6.5
As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014)
|
{'CVE-2020-15086'}
|
2021-11-19T15:44:20Z
|
2020-07-29T16:15:12Z
|
HIGH
| null |
{'CWE-502', 'CWE-325', 'CWE-20', 'CWE-200'}
|
{'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15086', 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75', 'https://github.com/FriendsOfTYPO3/mediace', 'https://github.com/FriendsOfTYPO3/mediace/pull/31'}
| null |
Packagist
|
GHSA-2p89-ppc2-mrq4
|
Cross site scripting in getgrav/grav
|
User input is not properly sanitized leading to cross site scrpting (xss) in grav.
|
{'CVE-2022-0743'}
|
2022-03-18T20:45:44Z
|
2022-03-02T00:00:22Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743', 'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'}
| null |
Packagist
|
GHSA-pqg8-crx9-g8m4
|
Backend Same-Site Request Forgery in TYPO3 CMS
|
> ### Meta
> * CVSS v3.1: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
> * CWE-352
> * CWE-346
### Problem
It has been discovered that backend user interface and install tool are vulnerable to same-origin request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server - scripts are then executed with the privileges of the victims' user session.
In a worst case scenario new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it’s actually a same-origin request forgery.
Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a 3rd party extension - e.g. file upload in a contact form with knowing the target location.
The attacked victim requires an active and valid backend or install tool user sessions at the time of the attack to be successful.
### Solution
Update to TYPO3 versions 9.5.17 or 10.4.2 that mitigates the problem described.
### Additional Considerations
The deployment of additional mitigation techniques is suggested as described below.
#### Sudo Mode Extension
This TYPO3 extension intercepts modifications to security relevant database tables, e.g. those storing user accounts or storages of the file abstraction layer. Modifications need to confirmed by again by the acting user with providing their password again - this technique is known as "sudo mode". This way unintended actions happening in the background can be mitigated.
* https://github.com/FriendsOfTYPO3/sudo-mode
* https://extensions.typo3.org/extension/sudo_mode
#### Content Security Policy
[Content Security Policies](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) tell (modern) browsers how resources served a particular site are handled - it also it possible to disallow script executions for specific locations. In a TYPO3 context it is suggested to disallow direct script execution at least for locations `/fileadmin/` and `/uploads/`.
```
# in fileadmin/.htaccess
<IfModule mod_headers.c>
Header add Content-Security-Policy "default-src 'self'; script-src 'none';"
</IfModule>
```
### Credits
Thanks to Matteo Bonaker who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-006
|
{'CVE-2020-11069'}
|
2021-11-08T18:49:16Z
|
2020-05-13T23:40:09Z
|
HIGH
| null |
{'CWE-346', 'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11069', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-pqg8-crx9-g8m4'}
| null |
Packagist
|
GHSA-cj8p-53v9-2c26
|
Cross-site Scripting in Bolt
|
Bolt before 3.6.10 has XSS via createFolder or createFile in Controller/Async/FilesystemManager.php.
|
{'CVE-2019-15485'}
|
2021-08-18T21:39:01Z
|
2019-11-08T15:28:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/bolt/bolt/releases/tag/v3.6.10', 'https://github.com/bolt/bolt/pull/7800', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485'}
| null |
Packagist
|
GHSA-vxhx-gmhm-623c
|
Improper Access Control in moodle
|
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25698'}
|
2021-03-24T23:17:35Z
|
2021-03-29T20:42:46Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895419', 'https://moodle.org/mod/forum/discuss.php?d=413935', 'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}
| null |
Packagist
|
GHSA-rp34-85x3-3764
|
Cross-site Scripting in librenms
|
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
|
{'CVE-2022-0576'}
|
2022-02-24T13:07:04Z
|
2022-02-15T00:02:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576', 'https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177'}
| null |
Packagist
|
GHSA-5hfj-r725-wpc4
|
Arbitrary code execution in october/system
|
### Impact
Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade.
### References
Credits to:
• Sushi Yushi
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-32650'}
|
2022-01-24T22:06:28Z
|
2022-01-14T21:08:26Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650'}
| null |
Packagist
|
GHSA-qpv2-jxc7-3638
|
Exposure of Sensitive Information in snipe/snipe-it
|
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
|
{'CVE-2022-0569'}
|
2022-02-24T13:13:01Z
|
2022-02-15T00:02:47Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0569', 'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/b41d5e63-bcd8-4864-8a2e-8ec74eec520b', 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}
| null |
Packagist
|
GHSA-r992-xph6-h7x2
|
Open redirect in microweber
|
microweber prior to 1.2.11 is vulnerable to open redirect.
|
{'CVE-2022-0560'}
|
2022-02-23T21:57:38Z
|
2022-02-12T00:00:48Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0560', 'https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25'}
| null |
Packagist
|
GHSA-v92m-hhhw-vv9v
|
Code injection in codiad
|
Codiad Web IDE through 2.8.4 allows PHP Code injection.
|
{'CVE-2019-19208'}
|
2021-08-30T21:59:12Z
|
2021-09-01T18:27:12Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://www.exploit-db.com/exploits/49902', 'https://github.com/Codiad/Codiad', 'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit', 'https://github.com/Codiad/Codiad/commits/master', 'https://herolab.usd.de/en/security-advisories/', 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208', 'https://herolab.usd.de/security-advisories/usd-2019-0049/'}
| null |
Packagist
|
GHSA-vm37-j55j-8655
|
OS Command Injection in Microweber
|
Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection.
|
{'CVE-2022-0557'}
|
2022-03-28T15:23:37Z
|
2022-02-12T00:00:49Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0557', 'https://www.exploit-db.com/exploits/50768', 'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632', 'http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8'}
| null |
Packagist
|
GHSA-83vp-6jqg-6cmr
|
Incorrect Authentication in shopware
|
### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24748'}
|
2022-03-18T20:15:32Z
|
2022-03-10T18:02:14Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748', 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr', 'https://github.com/shopware/platform'}
| null |
Packagist
|
GHSA-32wr-8wxm-852c
|
Deserialization of Untrusted Data in NukeViet
|
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
|
{'CVE-2019-7725'}
|
2021-04-07T22:08:23Z
|
2021-06-22T15:24:59Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725'}
| null |
Packagist
|
GHSA-rgp5-m2pq-3fmg
|
Cross-site Scripting in microweber
|
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0690'}
|
2022-02-23T19:28:54Z
|
2022-02-20T00:00:31Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690', 'https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9'}
| null |
Packagist
|
GHSA-q9p4-qfc8-fvpp
|
SQL Injection in medoo
|
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.
|
{'CVE-2019-10762'}
|
2021-10-08T23:09:47Z
|
2021-10-12T16:32:38Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562', 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762', 'https://github.com/catfan/Medoo'}
| null |
Packagist
|
GHSA-vj9x-w7ch-f46p
|
pimcore is vulnerable to SQL Injection
|
pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
|
{'CVE-2022-0258'}
|
2022-01-19T14:22:43Z
|
2022-01-21T23:50:08Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd', 'https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258'}
| null |
Packagist
|
GHSA-xjp4-6w75-qrj7
|
Remote CLI Command Execution Vulnerability in CodeIgniter4
|
### Impact
This vulnerability allows attackers to execute CLI routes via HTTP request.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-24711'}
|
2022-03-01T21:44:13Z
|
2022-03-01T21:44:13Z
|
CRITICAL
| null |
{'CWE-94', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24711', 'https://github.com/codeigniter4/CodeIgniter4', 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7'}
| null |
Packagist
|
GHSA-g8rg-7rpr-cwr2
|
Information Disclosure in TYPO3 extension sf_event_mgt
|
A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure.
Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control.
External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017)
|
{'CVE-2020-25026'}
|
2021-08-02T14:33:59Z
|
2020-09-02T18:03:26Z
|
MODERATE
| null |
{'CWE-863'}
|
{'https://packagist.org/packages/derhansen/sf_event_mgt', 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017', 'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026', 'https://typo3.org/help/security-advisories'}
| null |
Packagist
|
GHSA-5mj6-3cmq-fh34
|
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
|
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
|
{'CVE-2022-0079'}
|
2022-01-06T19:38:50Z
|
2022-01-06T22:22:46Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0079', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db', 'https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee'}
| null |
Packagist
|
GHSA-g5rr-p69h-7v3g
|
Insufficient type validation in pocketmine/pocketmine-mp
|
When an inventory interaction is performed (e.g. moving an item around an inventory), the client sends a serialized version of the itemstack to the server, which the server then deserializes and compares against its own copy. If the copies don't match, the transaction is invalid. This involves deserializing item NBT from the client, which allows for bogus data to be provided. Usually, this is harmless, but in this particular case, it could result in crashes on certain types of bad data (e.g. incorrect ListTag type provided for the `CanDestroy` tag). This is fixed in 4.2.9 by commit 5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2. It's non-trivial to workaround this, but can be done by handling `InventoryTransactionPacket` and `PlayerAuthInputPacket` to scrub inbound transaction data of bogus NBT that would cause these crashes.
| null |
2022-04-22T20:57:12Z
|
2022-04-22T20:57:12Z
|
HIGH
| null |
{'CWE-1287', 'CWE-20'}
|
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/releases/tag/4.2.9', 'https://github.com/pmmp/PocketMine-MP/blob/4.2.9/changelogs/4.2.md#429', 'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2'}
| null |
Packagist
|
GHSA-h9q8-5gv2-v6mg
|
Potential Session Hijacking
|
### Impact
Potential session hijacking of store customers.
### Patches
We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
| null |
2021-03-12T22:10:34Z
|
2021-03-12T23:09:08Z
|
LOW
| null |
{'CWE-613'}
|
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://packagist.org/packages/shopware/platform'}
| null |
Packagist
|
GHSA-33wf-4crm-2322
|
Improper Access Control in librenms
|
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
|
{'CVE-2022-0580'}
|
2022-02-24T12:12:44Z
|
2022-02-16T00:01:58Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580'}
| null |
Packagist
|
GHSA-wph3-44rj-92pr
|
Multiple vulnerabilities leading to RCE
|
### Impact
We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
### Patches
The issues were addressed in our last release, 2.1.59.
### Workarounds
If you can't update to 2.1.59, make sure your connector is not exposed without authentication.
### Reference
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research@sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-32682'}
|
2021-10-06T20:57:44Z
|
2021-06-16T17:04:29Z
|
CRITICAL
| null |
{'CWE-918', 'CWE-22', 'CWE-78'}
|
{'https://github.com/Studio-42/elFinder', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html', 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682'}
| null |
Packagist
|
GHSA-636j-7x7r-gvw2
|
Old sessions not blocked by login enable function in Snipe-IT
|
Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions console command, clearing the contents of the storage/framework/sessions directory, or changing the cookie name, but all of those options logout ALL users, which could be kind of annoying. This issue is fixed in versions 6.0.0-RC-6 and 5.4.2.
|
{'CVE-2022-1155'}
|
2022-04-13T13:28:21Z
|
2022-03-31T00:00:22Z
|
HIGH
| null |
{'CWE-613'}
|
{'https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1', 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d', 'https://github.com/snipe/snipe-it/releases/tag/v6.0.0-RC-6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155', 'https://github.com/snipe/snipe-it/pull/10876', 'https://github.com/snipe/snipe-it/releases/tag/v5.4.2', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-5pv8-ppvj-4h68
|
Prevent user enumeration using Guard or the new Authenticator-based Security
|
Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user.
Resolution
----------
We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4.
Credits
-------
I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
|
{'CVE-2021-21424'}
|
2021-05-13T15:25:38Z
|
2021-05-13T20:23:02Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21424', 'https://github.com/symfony/symfony/security/advisories/GHSA-5pv8-ppvj-4h68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH7TMM5CHQYBFFGXWRPJDPB3SKCZXI2M/', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UC7BND775DVZDQT3RMGD2HVB2PKLJDJW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/'}
| null |
Packagist
|
GHSA-4v37-24gm-h554
|
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
|
### Impact
This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**.
Otherwise, the CSRF protection may be bypassed.
#### When Auto-Routing is Enabled
1. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
#### When Auto-Routing is Disabled
Do one of the following:
1. Do not use `$routes->add()`, and [use HTTP verbs in routes](https://codeigniter4.github.io/userguide/incoming/routing.html#using-http-verbs-in-routes).
2. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
### References
- [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html#cross-site-request-forgery-csrf)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-24712'}
|
2022-03-01T21:47:28Z
|
2022-03-01T21:47:28Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554'}
| null |
Packagist
|
GHSA-pfj7-w373-gqch
|
Cross-Site Request Forgery in firefly-iii
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3900'}
|
2021-10-29T13:49:08Z
|
2021-10-28T23:14:21Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900', 'https://github.com/firefly-iii/firefly-iii', 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}
| null |
Packagist
|
GHSA-x92h-wmg2-6hp7
|
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
|
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
|
{'CVE-2019-10913'}
|
2021-08-19T15:18:27Z
|
2019-12-02T18:10:24Z
|
CRITICAL
| null |
{'CWE-79', 'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10913', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml', 'https://symfony.com/cve-2019-10913', 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec', 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides'}
| null |
Packagist
|
GHSA-34fr-fhqr-7235
|
Information Disclosure in User Authentication
|
> ### Meta
> * CVSS: `AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that user credentials have been logged as plaintext when explicitly using log level debug, which is not the _default_ configuration.
### Solution
Update to TYPO3 versions 7.6.52 ELTS, 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to Ingo Schmitt who reported this issue, and to TYPO3 core & security team member Benni Mack who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-012](https://typo3.org/security/advisory/typo3-core-sa-2021-012)
|
{'CVE-2021-32767'}
|
2021-08-31T21:23:03Z
|
2021-07-26T21:16:28Z
|
MODERATE
| null |
{'CWE-532'}
|
{'https://typo3.org/security/advisory/typo3-core-sa-2021-013', 'https://github.com/TYPO3/typo3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32767', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-34fr-fhqr-7235', 'https://typo3.org/security/advisory/typo3-core-sa-2021-012', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235'}
| null |
Packagist
|
GHSA-8gv3-3j7f-wg94
|
Potential Remote Code Execution vulnerability
|
Packages nette/application versions prior to 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette versions prior to 2.0.19 and 2.1.13 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE.
Reported by Cyku Hong from DEVCORE (https://devco.re)
### Impact
Code injection, possible remote code execution.
### Patches
Fixed in nette/application 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette 2.0.19 and 2.1.13
|
{'CVE-2020-15227'}
|
2021-11-19T15:12:40Z
|
2020-10-02T16:22:19Z
|
HIGH
| null |
{'CWE-94', 'CWE-74'}
|
{'https://packagist.org/packages/nette/application', 'https://github.com/nette/application', 'https://packagist.org/packages/nette/nette', 'https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15227', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html'}
| null |
Packagist
|
GHSA-65mj-7c86-79jf
|
Authentication Bypass in ADOdb/ADOdb
|
### Impact
An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes.
Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc.
### Patches
The vulnerability is fixed in ADOdb versions 5.20.21 (952de6c4273d9b1e91c2b838044f8c2111150c29) and 5.21.4 or later (b4d5ce70034c5aac3a1d51d317d93c037a0938d2).
The simplest patch is to delete line 29 in `drivers/adodb-postgres64.inc.php`:
```php
diff --git a/drivers/adodb-postgres64.inc.php b/drivers/adodb-postgres64.inc.php
index d04b7f67..729d7141 100644
--- a/drivers/adodb-postgres64.inc.php
+++ b/drivers/adodb-postgres64.inc.php
@@ -26,7 +26,6 @@ function adodb_addslashes($s)
{
$len = strlen($s);
if ($len == 0) return "''";
- if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted
return "'".addslashes($s)."'";
}
```
### Workarounds
Ensure the parameters passed to *ADOConnection::connect()* or related functions (_nConnect()_, _pConnect()_) are not surrounded by single quotes.
### Credits
Thanks to **Emmet Leahy** (@meme-lord) of Sorcery Ltd for reporting this vulnerability, and to the [huntr](https://huntr.dev/) team for their support.
### References
- Original issue report https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c/
- ADOdb reference issue #793
### For more information
If you have any questions or comments about this advisory:
* Add a note in issue #793
* Contact the maintainers on [Gitter](https://gitter.im/adodb/adodb)
|
{'CVE-2021-3850'}
|
2022-02-07T22:34:28Z
|
2022-01-27T15:23:19Z
|
CRITICAL
| null |
{'CWE-287', 'CWE-305'}
|
{'https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2', 'https://github.com/ADOdb/ADOdb/issues/793', 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf', 'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb', 'https://www.debian.org/security/2022/dsa-5101', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850'}
| null |
Packagist
|
GHSA-cfcv-q4qq-2ph4
|
CKEditor 4 vulnerabilities in versions <4.16.1
|
Details see:
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 )
Patch:
https://github.com/pimcore/pimcore/pull/10032
| null |
2021-10-08T21:19:54Z
|
2021-08-23T19:42:05Z
|
MODERATE
| null | null |
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4', 'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'}
| null |
Packagist
|
GHSA-x5jp-9fmm-m9pf
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3683'}
|
2021-11-17T21:11:15Z
|
2021-11-15T23:13:52Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683'}
| null |
Packagist
|
GHSA-x7p5-p2c9-phvg
|
Unexpected database bindings
|
This is a follow-up to the previous security advisory (GHSA-3p32-j457-pg5x) which addresses a few additional edge cases.
If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.
| null |
2021-02-02T15:46:07Z
|
2021-02-02T15:47:08Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://packagist.org/packages/laravel/framework', 'https://github.com/laravel/framework/security/advisories/GHSA-x7p5-p2c9-phvg', 'https://packagist.org/packages/illuminate/database', 'https://github.com/advisories/GHSA-3p32-j457-pg5x'}
| null |
Packagist
|
GHSA-52qp-jpq7-6c54
|
Insecure Deserialization of untrusted data in rmccue/requests
|
### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
* https://github.com/ambionics/phpggc/issues/52
* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
Originally fixed in WordPress 5.5.2:
* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
Related Security Advisories:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
* https://nvd.nist.gov/vuln/detail/CVE-2020-28032
Notification to the Requests repo including a fix in:
* https://github.com/rmccue/Requests/pull/421 and
* https://github.com/rmccue/Requests/pull/422
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Request](https://github.com/WordPress/Requests/)
|
{'CVE-2021-29476'}
|
2021-04-27T20:54:56Z
|
2021-04-29T21:52:30Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf', 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/', 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml', 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress', 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476', 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf', 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/', 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf', 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f', 'https://github.com/ambionics/phpggc/issues/52', 'https://github.com/rmccue/Requests/pull/421'}
| null |
Packagist
|
GHSA-m7h5-fjjq-559f
|
SQL Injection in topthink/thinkphp
|
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.
|
{'CVE-2020-20120'}
|
2021-10-07T13:56:41Z
|
2021-09-30T17:11:11Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://github.com/top-think/thinkphp/issues/553', 'https://github.com/top-think/thinkphp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-20120'}
| null |
Packagist
|
GHSA-hr3h-x6gq-rqcp
|
Cross site scripting via HTML attributes in the back end
|
### Impact
It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end).
Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE).
### Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7
### Workarounds
Disable all fields that allow HTML for untrusted back end users or disable the login for these users.
### References
https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
### Credits
Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.
|
{'CVE-2021-35955'}
|
2021-08-24T18:55:48Z
|
2021-08-25T14:45:01Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/contao/contao', 'https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp', 'https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35955'}
| null |
Packagist
|
GHSA-57hg-26h7-9qgv
|
pimcore is vulnerable to Cross-site Scripting
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2022-0256'}
|
2022-01-25T20:49:09Z
|
2022-01-21T23:48:07Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1'}
| null |
Packagist
|
GHSA-vx8q-j7h9-vf6q
|
Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin
|
PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
|
{'CVE-2022-0813'}
|
2022-03-17T21:43:51Z
|
2022-03-11T00:02:24Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information', 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0813'}
| null |
Packagist
|
GHSA-h2rj-8wgg-mm43
|
Cross-site Scripting in craftcms
|
Craft CMS before 3.6.13 has an XSS vulnerability.
|
{'CVE-2021-32470'}
|
2022-03-18T17:53:37Z
|
2022-03-18T17:53:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470', 'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'}
| null |
Packagist
|
GHSA-cg3q-59w7-rvc2
|
Reliance on Cookies without Validation and Integrity Checking in getgrav/grav
|
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another.
|
{'CVE-2021-3818'}
|
2021-09-28T20:32:37Z
|
2021-09-29T17:12:51Z
|
MODERATE
| null |
{'CWE-565'}
|
{'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea', 'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07', 'https://github.com/getgrav/grav'}
| null |
Packagist
|
GHSA-427q-jp8v-ww95
|
Cross-site Scripting in kimai2
|
CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams.
|
{'CVE-2021-3976'}
|
2021-11-22T18:43:54Z
|
2021-11-23T18:16:50Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3976', 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e', 'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406'}
| null |
Packagist
|
GHSA-gr23-g276-xc73
|
Cross Site Request Forgery in concrete5/concrete5
|
A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users.
|
{'CVE-2021-22954'}
|
2022-02-16T22:54:59Z
|
2022-02-11T00:00:58Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22954'}
| null |
Packagist
|
GHSA-wq3r-jwrq-xg6w
|
Canceling of orders not related to the logged-in user
|
### Impact
Canceling of orders not related to the logged-in user
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null |
2021-06-24T18:04:47Z
|
2021-06-28T16:57:23Z
|
MODERATE
| null | null |
{'https://github.com/shopware/platform/security/advisories/GHSA-wq3r-jwrq-xg6w', 'https://www.shopware.com/en/download/#shopware-6', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}
| null |
Packagist
|
GHSA-v384-jqmq-fc74
|
XSS in Dolibarr ERP & CRM
|
htdocs/user/passwordforgotten.php in Dolibarr 10.0.6 allows XSS via the Referer HTTP header.
|
{'CVE-2020-7996'}
|
2021-08-19T16:47:32Z
|
2020-01-28T22:26:16Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://tufangungor.github.io/exploit/2020/01/18/dolibarr-10.0.6-xss-in-http-header.html', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7996', 'https://github.com/tufangungor/tufangungor.github.io/blob/master/_posts/2020-01-19-dolibarr-10.0.6-xss-in-http-header.md'}
| null |
Packagist
|
GHSA-j739-gw6q-f4c7
|
HTML Injection in Froxlor
|
Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue.
|
{'CVE-2020-29653'}
|
2022-04-22T20:41:49Z
|
2022-04-14T00:00:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-29653', 'https://github.com/Froxlor/Froxlor', 'https://github.com/Froxlor/Froxlor/security/advisories', 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0', 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/'}
| null |
Packagist
|
GHSA-hjhp-hwfj-hwf3
|
Cross Site Request Forgery in firefly-iii
|
firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user.
|
{'CVE-2021-4005'}
|
2021-12-06T21:43:09Z
|
2021-12-10T20:20:08Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005', 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053', 'https://github.com/firefly-iii/firefly-iii'}
| null |
Packagist
|
GHSA-hq3v-rg6f-6hx4
|
Use of Insufficiently Random Values in yiisoft/yii2-dev
|
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
|
{'CVE-2021-3689'}
|
2021-08-30T20:28:40Z
|
2021-09-01T18:35:34Z
|
HIGH
| null |
{'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3689', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://github.com/yiisoft/yii2', 'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f'}
| null |
Packagist
|
GHSA-8w3x-r6x7-c5r5
|
Cross-site Scripting in pimcore
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4084'}
|
2021-12-14T14:44:34Z
|
2021-12-16T14:28:27Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084', 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'}
| null |
Packagist
|
GHSA-pgcp-m69h-p2gr
|
Cross-site Scripting (XSS) in moodle
|
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.
|
{'CVE-2020-25702'}
|
2021-03-24T23:15:17Z
|
2021-03-29T20:43:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413940', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25702', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'}
| null |
Packagist
|
GHSA-h58v-c6rf-g9f7
|
Cross site scripting in the system log
|
### Impact
It is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end.
### Patches
Update to Contao 4.9.16 or 4.11.5.
### Workarounds
Disable the system log module in the back end for all users (especially admin users).
### References
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2021-35210'}
|
2021-06-30T18:07:27Z
|
2021-07-01T17:00:04Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html', 'https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35210'}
| null |
Packagist
|
GHSA-gmrf-99gw-vvwj
|
/user/sessions endpoint allows detecting valid accounts
|
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
| null |
2021-03-11T17:41:49Z
|
2021-03-11T17:42:08Z
|
HIGH
| null |
{'CWE-203'}
|
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj', 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed', 'https://packagist.org/packages/ezsystems/ezpublish-kernel'}
| null |
Packagist
|
GHSA-6268-v434-45m5
|
Cross-site Scripting in Grav
|
Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images.
|
{'CVE-2019-16126'}
|
2021-08-17T22:39:50Z
|
2019-11-08T20:06:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16126', 'https://github.com/getgrav/grav/issues/2657'}
| null |
Packagist
|
GHSA-r6cm-wg48-rh2r
|
Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments
|
The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /index.php/backend_api/ajax_get_calendar_events Unfortunately, there is no authentication / permissions-check on that endpoint, the only required parameters in a POST request are "startDate", "endDate" and "csrfToken". Because the csrfToken can be obtained by any unauthenticated user just visiting the public form (and is valid for the backend as well), any attacker can query the backend API and obtain all sorts of private information about the appointment, in JSON format.
|
{'CVE-2022-0482'}
|
2022-04-17T17:13:16Z
|
2022-03-10T00:00:40Z
|
CRITICAL
| null |
{'CWE-863', 'CWE-359'}
|
{'http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html', 'https://github.com/alextselegidis/easyappointments', 'https://github.com/alextselegidis/easyappointments/releases/tag/1.4.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0482', 'https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/', 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466', 'https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.