ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist
|
GHSA-44cg-qcpr-fwjh
|
Cross site scripting in francoisjacquet/rosariosis
|
A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields.
|
{'CVE-2021-44565'}
|
2022-03-04T21:38:29Z
|
2022-02-25T00:01:07Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://gitlab.com/francoisjacquet/rosariosis', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44565', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/307', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}
| null |
Packagist
|
GHSA-3c33-3465-fhx2
|
Exposure of Resource to Wrong Sphere in LibreNMS
|
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
|
{'CVE-2020-15877'}
|
2021-07-26T19:20:01Z
|
2021-09-08T17:27:16Z
|
HIGH
| null |
{'CWE-668'}
|
{'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://shielder.it/blog', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877', 'https://community.librenms.org/c/announcements'}
| null |
Packagist
|
GHSA-455w-gv5p-wgg3
|
Cross-site Scripting in pimcore
|
pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules.
|
{'CVE-2022-0260'}
|
2022-01-26T22:10:34Z
|
2022-01-26T22:10:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://github.com/pimcore/pimcore/pull/11205'}
| null |
Packagist
|
GHSA-4574-qv3w-fcmg
|
Deserialization of Untrusted Data in codeception/codeception
|
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
|
{'CVE-2021-23420'}
|
2021-08-30T19:17:39Z
|
2021-09-01T18:36:15Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585', 'https://github.com/Codeception/Codeception/pull/6241', 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122', 'https://github.com/JinYiTong/poc', 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420', 'https://github.com/Codeception/Codeception'}
| null |
Packagist
|
GHSA-g9rq-x4fj-f5hx
|
Remote Code Execution Through Image Uploads in BookStack
|
### Impact
A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process.
This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application.
### Patches
The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5.
Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported.
### Workarounds
Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service.
Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this.
### References
[BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3)
[BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4)
[BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
* Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.
|
{'CVE-2020-5256'}
|
2021-01-08T21:18:55Z
|
2020-03-13T20:21:27Z
|
HIGH
| null |
{'CWE-95'}
|
{'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5256', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4', 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-g9rq-x4fj-f5hx', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5'}
| null |
Packagist
|
GHSA-wq4r-8342-jmc9
|
SQL injection in vhs (aka VHS: Fluid ViewHelpers)
|
The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.
|
{'CVE-2021-28381'}
|
2021-03-23T20:31:43Z
|
2021-03-29T20:24:44Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-001', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'}
| null |
Packagist
|
GHSA-m6j4-8r7p-wpp3
|
BuddyPress privilege escalation via REST API
|
### Impact
It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint.
### Patches
The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
### References
https://buddypress.org/2021/03/buddypress-7-2-1-security-release/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [HackerOne](https://hackerone.com/wordpress)
|
{'CVE-2021-21389'}
|
2021-10-06T16:57:01Z
|
2021-10-06T17:46:55Z
|
HIGH
| null |
{'CWE-863'}
|
{'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/', 'https://github.com/buddypress/BuddyPress', 'https://codex.buddypress.org/releases/version-7-2-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389', 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3'}
| null |
Packagist
|
GHSA-6r86-2jm9-9mh4
|
File upload restriction bypass in Zenario CMS
|
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
|
{'CVE-2022-23043'}
|
2022-03-04T21:39:12Z
|
2022-02-25T00:01:07Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://github.com/TribalSystems/Zenario', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19', 'https://fluidattacks.com/advisories/simone/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043'}
| null |
Packagist
|
GHSA-pc32-x737-74cv
|
Cross-site Scripting in Pimcore
|
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
|
{'CVE-2022-0704'}
|
2022-03-29T15:16:23Z
|
2022-03-17T00:00:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
| null |
Packagist
|
GHSA-w267-m9c4-8555
|
Shopware user session is not logged out if the password is reset via password recovery
|
### Impact
User session is not logged out if the password is reset via password recovery
## Patches
Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
{'CVE-2022-24744'}
|
2022-03-18T20:12:59Z
|
2022-03-10T17:37:43Z
|
LOW
| null |
{'CWE-613'}
|
{'https://github.com/shopware/platform', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24744'}
| null |
Packagist
|
GHSA-f884-gm86-cg3q
|
PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841
|
### Impact
We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
### Patches
In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at [email protected]
| null |
2020-01-07T17:20:13Z
|
2020-01-07T17:20:47Z
|
HIGH
| null | null |
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'}
| null |
Packagist
|
GHSA-7r79-mrp6-8mhq
|
Rate limit missing in microweber
|
Microweber prior to version 1.3 does not rate limit password reset emails.
|
{'CVE-2022-0777'}
|
2022-03-10T16:00:56Z
|
2022-03-02T00:00:19Z
|
HIGH
| null |
{'CWE-640'}
|
{'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777'}
| null |
Packagist
|
GHSA-4pc3-96mx-wwc8
|
Remote code execution in PHPMailer
|
### Impact
The `isMail` transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the `mail` command and consequently execute arbitrary code by leveraging improper interaction between the `escapeshellarg` function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
This issue really emphasises that it's worth avoiding the built-in PHP `mail()` function entirely.
### Patches
Fixed in 5.2.20
### Workarounds
Send via SMTP to localhost instead of calling the `mail()` function.
### References
https://nvd.nist.gov/vuln/detail/CVE-2016-10045
See also https://nvd.nist.gov/vuln/detail/CVE-2016-10033
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2016-10045'}
|
2021-08-19T19:43:37Z
|
2020-03-05T22:09:14Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html', 'http://www.securitytracker.com/id/1037533', 'https://www.exploit-db.com/exploits/40986/', 'http://www.securityfocus.com/bid/95130', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'https://www.exploit-db.com/exploits/40969/', 'http://openwall.com/lists/oss-security/2016/12/28/1', 'http://seclists.org/fulldisclosure/2016/Dec/81', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10045.yaml', 'http://www.securityfocus.com/archive/1/539967/100/0/threaded', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4pc3-96mx-wwc8', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20', 'https://www.exploit-db.com/exploits/42221/', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10045'}
| null |
Packagist
|
GHSA-xcr3-4qvr-54rh
|
Cross-site Scripting in Pimcore
|
Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip.
|
{'CVE-2022-1351'}
|
2022-04-22T20:46:44Z
|
2022-04-15T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1351'}
| null |
Packagist
|
GHSA-g39q-f4rm-85x4
|
OS Command Injection in baserCMS
|
baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors.
|
{'CVE-2021-20682'}
|
2021-03-29T22:37:23Z
|
2021-06-08T20:10:37Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20682', 'https://packagist.org/packages/baserproject/basercms', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://basercms.net/security/JVN64869876', 'https://github.com/baserproject/basercms'}
| null |
Packagist
|
GHSA-x8wj-6m73-gfqp
|
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
|
### Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.
The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.
### Patches
Yes, see version 1.9.3 and 2.1.5.
### References
https://owasp.org/www-community/attacks/Path_Traversal
### Credits:
This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: [email protected]
|
{'CVE-2020-5237'}
|
2021-01-08T20:30:34Z
|
2020-02-18T18:59:24Z
|
HIGH
| null |
{'CWE-23', 'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp'}
| null |
Packagist
|
GHSA-xh99-hw7h-wf63
|
Unchecked validity of Facing values in PlayerActionPacket
|
### Impact
A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`).
### Patches
f126479c37ff00a717a828f5271cf8e821d12d6c
### Workarounds
Using a plugin, cancel `DataPacketReceiveEvent` if the packet is `PlayerActionPacket` and the facing is outside the range 0-5 when receiving START_BREAK or CRACK_BLOCK actions, or UseItemTransactionData. However, beware that negative values may be legitimate in some cases.
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
| null |
2022-01-13T22:08:36Z
|
2022-01-13T22:25:44Z
|
HIGH
| null | null |
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c', 'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63'}
| null |
Packagist
|
GHSA-qw36-p97w-vcqr
|
Cookie persistence after password changes in symfony/security-bundle
|
Description
-----------
Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password.
Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie.
Resolution
----------
Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3.
Credits
-------
We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
|
{'CVE-2021-41268'}
|
2021-12-01T14:36:09Z
|
2021-11-24T20:05:22Z
|
MODERATE
| null |
{'CWE-384'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc', 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}
| null |
Packagist
|
GHSA-jh5x-hfhg-78jq
|
Deserialization of Untrusted Data in Archive_Tar
|
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
|
{'CVE-2020-28948'}
|
2022-04-01T18:11:11Z
|
2021-04-22T16:20:50Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.debian.org/security/2020/dsa-4817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://github.com/pear/Archive_Tar/issues/33', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar'}
| null |
Packagist
|
GHSA-8wcc-f2vq-h4gx
|
Cross-site Scripting in livehelperchat
|
Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed.
|
{'CVE-2022-0370'}
|
2022-02-03T20:34:04Z
|
2022-01-28T23:06:22Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca'}
| null |
Packagist
|
GHSA-w6j8-jc36-x5q9
|
Improper Neutralization of Text-Values in Object Version Preview
|
Text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources.
|
{'CVE-2021-39166'}
|
2021-09-01T18:19:02Z
|
2021-09-01T18:22:09Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/10170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39166', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9'}
| null |
Packagist
|
GHSA-c697-r227-pq6h
|
Unrestricted Upload of File with Dangerous Type in pimcore
|
Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore
|
{'CVE-2022-0263'}
|
2022-01-25T20:47:39Z
|
2022-01-21T23:33:58Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0263', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6'}
| null |
Packagist
|
GHSA-gp6w-ccqv-p7qr
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-3729'}
|
2021-08-24T20:06:36Z
|
2021-08-25T14:49:58Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76'}
| null |
Packagist
|
GHSA-hx6g-q9v2-xh7v
|
Information exposure in elgg
|
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.
|
{'CVE-2021-3980'}
|
2021-12-06T22:01:08Z
|
2021-12-16T15:30:48Z
|
HIGH
| null |
{'CWE-359'}
|
{'https://github.com/Elgg/Elgg/pull/13791', 'https://github.com/Elgg/Elgg', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}
| null |
Packagist
|
GHSA-gxmc-5wj3-jx64
|
Cross-site scripting in application/controllers/dropbox.php in JustWriting
|
Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
|
{'CVE-2021-41467'}
|
2021-10-05T16:02:20Z
|
2021-10-04T20:13:25Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hjue/JustWriting/issues/106', 'https://github.com/hjue/JustWriting', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467', 'https://github.com/hjue/JustWriting/'}
| null |
Packagist
|
GHSA-p48w-vf3c-rqjx
|
Cross-Site Scripting in Bootstrap Package
|
### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
### Solution
Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
|
{'CVE-2021-21365'}
|
2021-04-27T19:43:14Z
|
2021-04-29T21:51:21Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
| null |
Packagist
|
GHSA-mhfv-8rc9-w38c
|
Arbitrary shell execution
|
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
| null |
2022-03-26T00:06:00Z
|
2022-03-26T00:06:00Z
|
HIGH
| null | null |
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml', 'https://github.com/squizlabs/PHP_CodeSniffer', 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1'}
| null |
Packagist
|
GHSA-536p-4pcj-5mr9
|
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.
|
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
|
{'CVE-2021-38557'}
|
2021-09-03T20:36:06Z
|
2021-09-02T17:10:52Z
|
HIGH
| null |
{'CWE-732', 'CWE-276'}
|
{'https://zerosecuritypenetrationtesting.com/?page_id=306', 'https://github.com/RaspAP/raspap-webgui', 'https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38557'}
| null |
Packagist
|
GHSA-93wh-35r4-6qmw
|
Exposure of Sensitive Information to an Unauthorized Actor in moodle
|
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
|
{'CVE-2021-20281'}
|
2021-03-24T23:14:27Z
|
2021-03-29T20:43:23Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
| null |
Packagist
|
GHSA-g475-pch5-6wvv
|
Authentication bypass in MAGMI
|
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.
|
{'CVE-2020-5777'}
|
2021-05-05T19:06:27Z
|
2021-05-06T18:54:35Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'}
| null |
Packagist
|
GHSA-f6p7-8xfw-fjqq
|
Authenticated Stored XSS in Administration
|
### Impact
Authenticated Stored XSS in Administration
### Patches
We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021
| null |
2021-05-18T16:08:07Z
|
2021-05-21T14:29:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}
| null |
Packagist
|
GHSA-277v-gwfr-hmpj
|
Missing Authentication for Critical Function in LibreNMS
|
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
|
{'CVE-2019-10668'}
|
2021-05-11T15:02:40Z
|
2019-10-11T18:43:06Z
|
MODERATE
| null |
{'CWE-306'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10668', 'https://www.darkmatter.ae/xen1thlabs/librenms-authentication-bypass-vulnerability-xl-19-016/'}
| null |
Packagist
|
GHSA-4hjq-422q-4vpx
|
Secret data exfiltration via symfony parameters
|
### Impact
Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
For example,
1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <`script> console.log("db password is: %mautic.db_password%"); </script>`
2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: <real password>`
Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
### Patches
Upgrade to 3.3.2
### Workarounds
No
### References
No
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
{'CVE-2021-27908'}
|
2021-04-05T20:45:30Z
|
2021-04-06T17:20:58Z
|
MODERATE
| null |
{'CWE-732'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27908', 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}
| null |
Packagist
|
GHSA-wg4r-q74r-p7c8
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0941'}
|
2022-03-23T15:42:44Z
|
2022-03-15T00:01:03Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc'}
| null |
Packagist
|
GHSA-xwjr-6fj7-fc6h
|
Local File Inclusion by unauthenticated users
|
### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
### Threat assessment:
<img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png">
|
{'CVE-2020-15246'}
|
2021-11-19T13:46:03Z
|
2020-11-23T19:48:12Z
|
HIGH
| null |
{'CWE-863', 'CWE-22'}
|
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h'}
| null |
Packagist
|
GHSA-4mg9-vhxq-vm7j
|
SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database
|
### Impact
Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability.
### Patches
This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0.
### Workarounds
You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
| null |
2021-11-18T19:46:31Z
|
2021-04-29T21:52:53Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j', 'https://packagist.org/packages/laravel/framework', 'https://packagist.org/packages/illuminate/database', 'https://github.com/laravel/framework'}
| null |
Packagist
|
GHSA-x7hc-x7fm-f7qh
|
Cross-Site Scripting in Content Preview (CType menu)
|
> ### Meta
> * CVSS: `AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1)
> * CWE-79
> * Status: **DRAFT**
### Problem
It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008)
|
{'CVE-2021-21370'}
|
2021-03-23T01:42:20Z
|
2021-03-23T01:54:17Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21370', 'https://packagist.org/packages/typo3/cms-backend', 'https://typo3.org/security/advisory/typo3-core-sa-2021-008', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh'}
| null |
Packagist
|
GHSA-r5gm-4p5w-pq2p
|
Remote code execution in verot/class.upload.php
|
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
|
{'CVE-2019-19576'}
|
2021-08-19T16:24:46Z
|
2020-01-16T22:17:40Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://www.verot.net', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'https://github.com/jra89/CVE-2019-19576', 'https://www.verot.net/php_class_upload.htm'}
| null |
Packagist
|
GHSA-rwqq-p4p9-5wpq
|
Wechat-php-sdk is affected by a Cross Site Scripting vulnerability.
|
Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.
|
{'CVE-2021-43678'}
|
2022-01-04T20:03:15Z
|
2022-01-07T00:00:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/gaoming13/wechat-php-sdk', 'https://github.com/gaoming13/wechat-php-sdk/issues/30', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43678'}
| null |
Packagist
|
GHSA-q7j5-9j77-g4gq
|
Remote code execution in turn extension for TYPO3
|
The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.
|
{'CVE-2020-15515'}
|
2021-07-29T20:50:40Z
|
2020-07-29T18:07:41Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515'}
| null |
Packagist
|
GHSA-59cf-m7v5-wh5w
|
Cross-Site Scripting in SVG Sanitizer
|
Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting.
An updated version 1.0.3 is available from the TYPo3 extension manager and at https://extensions.typo3.org/extension/download/svg_sanitizer/1.0.3/zip/
Users of the extension are advised to update the extension as soon as possible.
|
{'CVE-2020-11070'}
|
2021-01-08T20:16:29Z
|
2020-05-13T22:17:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11070', 'https://github.com/TYPO3GmbH/svg_sanitizer/security/advisories/GHSA-59cf-m7v5-wh5w'}
| null |
Packagist
|
GHSA-h7qw-mxrm-c6h2
|
Unauthenticated crypto and weak IV in Magento\Framework\Encryption
|
The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value.
|
{'CVE-2016-6485'}
|
2021-08-18T22:35:44Z
|
2019-11-20T01:33:05Z
|
HIGH
| null |
{'CWE-327'}
|
{'http://www.openwall.com/lists/oss-security/2016/07/27/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485', 'http://www.openwall.com/lists/oss-security/2016/07/19/3', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml', 'https://github.com/magento/magento2/pull/15017'}
| null |
Packagist
|
GHSA-97cc-825c-399g
|
Cross site scripting in remdex/livehelperchat
|
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4050'}
|
2021-12-09T18:07:18Z
|
2021-12-10T20:33:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
| null |
Packagist
|
GHSA-m5vx-8chx-qvmm
|
Form validation can be skipped
|
### Impact
By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators.
We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified.
That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent.
### Patches
https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246
### Workarounds
Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data.
Alternatively a custom Finisher can be added as first finisher.
### References
This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)
|
{'CVE-2021-32697'}
|
2021-07-29T14:34:11Z
|
2021-06-22T15:15:08Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/releases/tag/5.1.3', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}
| null |
Packagist
|
GHSA-mrvj-7q4f-5p42
|
Cross-site scripting in eZ Platform Kernel
|
### Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
### Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at:
https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109
### Important note
You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
| null |
2021-03-19T19:56:16Z
|
2021-03-19T19:56:42Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
| null |
Packagist
|
GHSA-jj8r-p9f5-fmvv
|
Cross-site Scripting in TYPO3 extension
|
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
|
{'CVE-2021-36785'}
|
2021-08-30T17:07:59Z
|
2021-08-30T17:22:25Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://typo3.org/help/security-advisories/security', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}
| null |
Packagist
|
GHSA-w7r7-r8r9-vrg2
|
Session fixation in change password form
|
SilverStripe through 4.3.3 allows session fixation in the "change password" form.
|
{'CVE-2019-12203'}
|
2021-08-18T22:28:15Z
|
2019-11-12T23:01:39Z
|
MODERATE
| null |
{'CWE-384'}
|
{'https://www.silverstripe.org/download/security-releases/CVE-2019-12203', 'https://www.silverstripe.org/download/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12203', 'https://forum.silverstripe.org/c/releases', 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444'}
| null |
Packagist
|
GHSA-pj4j-287j-f742
|
Cross-site Scripting in Contao
|
Contao before 4.5.7 has XSS in the system log.
|
{'CVE-2018-10125'}
|
2021-05-03T21:22:13Z
|
2022-02-10T20:49:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10125'}
| null |
Packagist
|
GHSA-hxmr-5gv9-6p8v
|
Cross-site Scripting in librenms
|
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
|
{'CVE-2022-0575'}
|
2022-02-24T13:06:37Z
|
2022-02-15T00:02:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
| null |
Packagist
|
GHSA-g3h8-cg9x-47qw
|
PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby
|
### Impact
An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file.
Visitors without Panel access *cannot* use this attack vector.
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881).
### Credits
Thanks to Thore Imhof of Accenture for reporting the problem.
|
{'CVE-2020-26255'}
|
2021-01-07T22:37:40Z
|
2020-12-08T14:42:08Z
|
LOW
| null |
{'CWE-434'}
|
{'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://packagist.org/packages/getkirby/panel'}
| null |
Packagist
|
GHSA-mxr5-mc97-63rc
|
Account Takeover in Octobercms
|
### Impact
An attacker can request an account password reset and then gain access to the account using a specially crafted request.
- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
{'CVE-2021-32648'}
|
2022-02-23T22:21:06Z
|
2021-08-30T16:13:02Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/october'}
| null |
Packagist
|
GHSA-9f8f-574q-8jmf
|
Manipulation of product reviews via API
|
### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
{'CVE-2021-37707'}
|
2021-08-26T19:40:47Z
|
2021-08-30T16:14:00Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf'}
| null |
Packagist
|
GHSA-cjw5-f2x5-r4q5
|
Cross-site Scripting in TastyIgniter
|
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
|
{'CVE-2022-0602'}
|
2022-04-19T14:12:53Z
|
2022-04-06T00:01:29Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/tastyigniter/TastyIgniter', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
| null |
Packagist
|
GHSA-735v-wx75-xmmm
|
Cross-site Scripting in grav
|
In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering.
|
{'CVE-2022-0268'}
|
2022-01-31T21:45:04Z
|
2022-01-27T18:27:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268'}
| null |
Packagist
|
GHSA-4p9g-qgx9-397p
|
Denial of Service in Page Error Handling
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)
> * CWE-405, CWE-674
> * Status: **DRAFT**
### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.
### Solution
Update to TYPO3 versions 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Paul Keller, Mathias Bolt Lesniak and Kay Strobach who reported this issue and to TYPO3 framework merger Frank Nägler and to TYPO3 security team member Torben Hansen who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005)
|
{'CVE-2021-21359'}
|
2021-03-29T17:43:44Z
|
2021-03-23T01:54:09Z
|
MODERATE
| null |
{'CWE-405', 'CWE-674'}
|
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2021-005', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21359'}
| null |
Packagist
|
GHSA-cchx-mfrc-fwqr
|
Improper authentication in Symfony
|
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
|
{'CVE-2019-10911'}
|
2021-09-30T18:40:15Z
|
2020-02-12T18:45:08Z
|
HIGH
| null |
{'CWE-287', 'CWE-200'}
|
{'https://symfony.com/cve-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/symfony/symfony ', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911'}
| null |
Packagist
|
GHSA-vhrp-8qx4-vr6c
|
Incorrect Access Control in Ignition
|
The Ignition component before 1.16.15, and 2.0.x before 2.0.6, for Laravel has a "fix variable names" feature that can lead to incorrect access control.
|
{'CVE-2021-43996'}
|
2021-11-19T20:18:15Z
|
2021-11-19T20:18:20Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://github.com/facade/ignition/compare/2.0.5...2.0.6', 'https://github.com/facade/ignition/pull/285', 'https://github.com/facade/ignition', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43996', 'https://github.com/facade/ignition/compare/1.16.14...1.16.15'}
| null |
Packagist
|
GHSA-f9p3-h6cg-2cjr
|
Improper neutralization of formula elements in yii-helpers
|
Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
|
{'CVE-2022-1544'}
|
2022-05-04T03:01:04Z
|
2022-05-03T00:00:46Z
|
HIGH
| null |
{'CWE-1236'}
|
{'https://github.com/luyadev/yii-helpers', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb', 'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4'}
| null |
Packagist
|
GHSA-7x2h-3v2v-24p9
|
Cross-Site Request Forgery in microweber
|
microweber version 1.2.10 and prior is vulnerable to cross-site request forgery.
|
{'CVE-2022-0505'}
|
2022-02-14T22:33:33Z
|
2022-02-09T00:00:31Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
| null |
Packagist
|
GHSA-jq4p-mq33-w375
|
Cross-site Scripting when rendering error messages in laminas-form
|
### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack.
### Patches
The following versions were issued to mitigate the vulnerability:
- 2.17.1
- 3.0.2
- 3.1.1
### Workarounds
At the top of a view script where you call the `formElementErrors()` view helper, place the following code:
```php
use Laminas\Form\ElementInterface;
use Laminas\View\PhpRenderer;
$escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void {
$messages = $element->getMessages();
if (! $messages) {
return;
}
$escaped = [];
array_walk_recursive(
$messages,
static function (string $item) use (&$escaped, $renderer): void {
$escaped[] = $renderer->escapeHtml($item);
}
};
$element->setMessages($escaped);
};
```
Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows
```php
// Usage with a form
// $this is the view renderer
$escapeMessages($form, $this);
// Usage with a fieldset
// $this is the view renderer
$escapeMessages($fieldset, $this);
// Usage with a form element
// $this is the view renderer
$escapeMessages($element, $this);
```
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/laminas/laminas-form/issues/new)
* Email us at [[email protected]](mailto:[email protected])
|
{'CVE-2022-23598'}
|
2022-02-07T21:16:31Z
|
2022-01-28T23:08:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/', 'https://github.com/laminas/laminas-form/', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598'}
| null |
Packagist
|
GHSA-75p7-527p-w8wp
|
Server-Side Request Forgery and Open Redirect in AllTube Download
|
### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.)
### Patches
3.0.3 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched.
However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.
### References
* https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a
* https://github.com/ytdl-org/youtube-dl/issues/30691
|
{'CVE-2022-24739'}
|
2022-03-09T20:13:46Z
|
2022-03-09T15:17:31Z
|
HIGH
| null |
{'CWE-918', 'CWE-601'}
|
{'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'}
| null |
Packagist
|
GHSA-w7x8-cq7r-g5g9
|
Cross Site Scripting in Microweber
|
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
|
{'CVE-2021-33988'}
|
2021-10-22T19:37:10Z
|
2021-10-25T19:43:39Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33988', 'https://github.com/nck0099/osTicket/issues/2', 'https://github.com/microweber/microweber'}
| null |
Packagist
|
GHSA-7563-75j9-6h5p
|
Sensitive Information Exposure in Sylius
|
### Impact
Any other user can view the data if the browser tab remains open after logging out. Once someone logs out and leaves the browser open, the potential attacker may use the back button to see the content exposed on given screens. No action may be performed though, and any website refresh will block further reads. It may, however, lead to a data leak, like for example customer details, payment gateway configuration, etc.- but only if these were pages checked by the administrator.
This vulnerability requires full access to the computer to take advantage of it.
### Patches
The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2 and above.
### Workarounds
The application must strictly redirect to the login page even when the browser back button is pressed. Another possibility is to set more strict cache policies for restricted content (like no-store). It can be achieved with the following class:
```php
<?php
declare(strict_types=1);
namespace App\EventListener;
use App\SectionResolver\ShopCustomerAccountSubSection;
use Sylius\Bundle\AdminBundle\SectionResolver\AdminSection;
use Sylius\Bundle\CoreBundle\SectionResolver\SectionProviderInterface;
use Symfony\Component\EventDispatcher\EventSubscriberInterface;
use Symfony\Component\HttpKernel\Event\ResponseEvent;
use Symfony\Component\HttpKernel\KernelEvents;
final class CacheControlSubscriber implements EventSubscriberInterface
{
/** @var SectionProviderInterface */
private $sectionProvider;
public function __construct(SectionProviderInterface $sectionProvider)
{
$this->sectionProvider = $sectionProvider;
}
public static function getSubscribedEvents(): array
{
return [
KernelEvents::RESPONSE => 'setCacheControlDirectives',
];
}
public function setCacheControlDirectives(ResponseEvent $event): void
{
if (
!$this->sectionProvider->getSection() instanceof AdminSection &&
!$this->sectionProvider->getSection() instanceof ShopCustomerAccountSubSection
) {
return;
}
$response = $event->getResponse();
$response->headers->addCacheControlDirective('no-cache', true);
$response->headers->addCacheControlDirective('max-age', '0');
$response->headers->addCacheControlDirective('must-revalidate', true);
$response->headers->addCacheControlDirective('no-store', true);
}
}
```
After that register service in the container:
```yaml
services:
App\EventListener\CacheControlSubscriber:
arguments: ['@sylius.section_resolver.uri_based_section_resolver']
tags:
- { name: kernel.event_subscriber, event: kernel.response }
```
The code above requires changes in `ShopUriBasedSectionResolver` in order to work. To backport mentioned logic, you need to replace the `Sylius\Bundle\ShopBundle\SectionResolver\ShopUriBasedSectionResolver` class with:
```php
<?php
declare(strict_types=1);
namespace App\SectionResolver;
use Sylius\Bundle\CoreBundle\SectionResolver\SectionInterface;
use Sylius\Bundle\CoreBundle\SectionResolver\UriBasedSectionResolverInterface;
use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection;
final class ShopUriBasedSectionResolver implements UriBasedSectionResolverInterface
{
/** @var string */
private $shopCustomerAccountUri;
public function __construct(string $shopCustomerAccountUri = 'account')
{
$this->shopCustomerAccountUri = $shopCustomerAccountUri;
}
public function getSection(string $uri): SectionInterface
{
if (str_contains($uri, $this->shopCustomerAccountUri)) {
return new ShopCustomerAccountSubSection();
}
return new ShopSection();
}
}
```
```yaml
services:
sylius.section_resolver.shop_uri_based_section_resolver:
class: App\SectionResolver\ShopUriBasedSectionResolver
tags:
- { name: sylius.uri_based_section_resolver, priority: -10 }
```
You also need to define a new subsection for the Customer Account that is used in the above services:
```php
<?php
declare(strict_types=1);
namespace App\SectionResolver;
use Sylius\Bundle\ShopBundle\SectionResolver\ShopSection;
class ShopCustomerAccountSubSection extends ShopSection
{
}
```
### References
* Originally published at https://huntr.dev/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [email protected]
|
{'CVE-2022-24742'}
|
2022-03-15T21:47:08Z
|
2022-03-14T22:26:58Z
|
MODERATE
| null |
{'CWE-213', 'CWE-200'}
|
{'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-7563-75j9-6h5p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24742', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10'}
| null |
Packagist
|
GHSA-gmr7-m73x-6c9q
|
Missing Authorization in TeamPass
|
Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.
|
{'CVE-2020-11671'}
|
2021-07-26T21:11:19Z
|
2021-07-26T21:22:13Z
|
HIGH
| null |
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11671', 'https://github.com/nilsteampassnet/TeamPass/issues/2765'}
| null |
Packagist
|
GHSA-f77h-m9w2-vvg2
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-4017'}
|
2021-12-02T20:24:56Z
|
2021-12-03T20:38:57Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'}
| null |
Packagist
|
GHSA-356r-77q8-f64f
|
Cross-Site Request Forgery in firefly-iii
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
|
{'CVE-2021-3819'}
|
2021-09-30T18:35:17Z
|
2021-09-29T17:12:37Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/firefly-iii/firefly-iii'}
| null |
Packagist
|
GHSA-738m-f33v-qc2r
|
SMTP Injection in PHPMailer
|
### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
### Workarounds
Manually strip line breaks from email addresses before passing them to PHPMailer.
### References
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2015-8476'}
|
2020-03-05T21:57:18Z
|
2020-03-05T22:09:19Z
|
LOW
| null |
{'CWE-20'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
| null |
Packagist
|
GHSA-p68v-frgx-4rjp
|
Denial of Service via Cache Flooding
|
### Impact
Denial of Service via Cache Flooding
### Patches
We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
| null |
2020-10-19T21:34:01Z
|
2020-10-19T21:34:14Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-p68v-frgx-4rjp'}
| null |
Packagist
|
GHSA-86r3-4gq8-xw8q
|
Remote Code Execution in Laravel
|
A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Capsule\Manager.php, and (3) __invoke in mockery\library\Mockery\ClosureWrapper.php.
|
{'CVE-2021-43503'}
|
2022-04-17T17:14:14Z
|
2022-04-09T00:00:25Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}
| null |
Packagist
|
GHSA-4286-h47h-m5v6
|
Improper Authentication in showdoc
|
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
|
{'CVE-2021-41745'}
|
2021-10-25T18:46:11Z
|
2021-10-25T19:43:24Z
|
HIGH
| null |
{'CWE-434', 'CWE-287'}
|
{'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/star7th/showdoc', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability', 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745'}
| null |
Packagist
|
GHSA-6fmv-q269-55cw
|
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
|
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit template.
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by Aquilao Null
|
{'CVE-2020-15277'}
|
2021-01-08T21:18:07Z
|
2020-10-30T17:05:59Z
|
HIGH
| null |
{'CWE-434', 'CWE-74'}
|
{'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277'}
| null |
Packagist
|
GHSA-qf6q-qfwp-vp44
|
Origin Validation Error in Magento 2
|
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
|
{'CVE-2020-8818'}
|
2021-10-08T22:34:05Z
|
2021-10-12T16:30:58Z
|
HIGH
| null |
{'CWE-346'}
|
{'https://github.com/cardgate/magento2/releases/tag/v2.0.33', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818', 'https://github.com/cardgate/magento2/issues/54', 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107', 'https://github.com/cardgate/magento2', 'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html'}
| null |
Packagist
|
GHSA-jmhf-9fj8-88gh
|
Open Redirect in AllTube
|
### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a
* https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/
* https://nvd.nist.gov/vuln/detail/CVE-2022-0692
|
{'CVE-2022-0692'}
|
2022-03-02T21:07:57Z
|
2022-02-23T21:15:01Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://github.com/Rudloff/alltube', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692'}
| null |
Packagist
|
GHSA-c53v-qmrx-93hg
|
Open redirect in shopware
|
### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
|
{'CVE-2022-21651'}
|
2022-01-06T20:18:17Z
|
2022-01-06T23:49:19Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651'}
| null |
Packagist
|
GHSA-rpg7-q4cv-p466
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-4123'}
|
2022-01-04T18:52:37Z
|
2021-12-17T20:00:16Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123', 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba'}
| null |
Packagist
|
GHSA-q3x2-jvp3-wj78
|
Unrestricted XML files leading to cross-site scripting in Microweber
|
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
|
{'CVE-2022-0963'}
|
2022-03-29T15:42:17Z
|
2022-03-16T00:00:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}
| null |
Packagist
|
GHSA-9pgx-gcph-mpqr
|
XSS via the history parameter in SQL command
|
### Impact
Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected.
### Patches
Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
Use browser which encodes URL parameters (e.g. Chrome or Firefox).
### References
https://sourceforge.net/p/adminer/bugs-and-features/775/
### For more information
If you have any questions or comments about this advisory:
* Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
|
{'CVE-2020-35572'}
|
2021-10-06T21:19:31Z
|
2021-02-11T20:42:28Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://packagist.org/packages/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr', 'https://sourceforge.net/p/adminer/news/', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://github.com/vrana/adminer'}
| null |
Packagist
|
GHSA-88rc-3p98-rgvx
|
After order payment process manipulation in shopware/platform and shopware/core
|
### Impact
After order payment process manipulation
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
| null |
2021-04-12T22:33:13Z
|
2021-04-13T15:13:48Z
|
CRITICAL
| null |
{'CWE-668'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}
| null |
Packagist
|
GHSA-5f37-gxvh-23v6
|
Remote code execution in PHPMailer
|
### Impact
The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted `Sender` property.
### Patches
Fixed in 5.2.18
### Workarounds
Filter and validate user input before passing it to internal functions.
### References
https://nvd.nist.gov/vuln/detail/CVE-2016-10033
Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2016-10033'}
|
2021-08-19T19:40:03Z
|
2020-03-05T22:09:17Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.exploit-db.com/exploits/40970/', 'https://www.exploit-db.com/exploits/40968/', 'https://www.exploit-db.com/exploits/42024/', 'http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html', 'http://www.securityfocus.com/archive/1/539963/100/0/threaded', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml', 'http://www.securityfocus.com/bid/95108', 'https://www.exploit-db.com/exploits/42221/', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'https://www.exploit-db.com/exploits/40969/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10033', 'https://www.exploit-db.com/exploits/41962/', 'http://www.securitytracker.com/id/1037533', 'https://www.exploit-db.com/exploits/40986/', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://www.drupal.org/psa-2016-004', 'https://www.exploit-db.com/exploits/41996/', 'https://www.exploit-db.com/exploits/40974/', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'http://seclists.org/fulldisclosure/2016/Dec/78'}
| null |
Packagist
|
GHSA-2p6g-gjp8-ggg9
|
Validation bypass in personnummer
|
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:[email protected])
### Credits
Niklas Sköldmark (Medborgarskolan)
| null |
2020-09-11T16:41:24Z
|
2020-09-09T17:29:34Z
|
LOW
| null | null |
{'https://packagist.org/packages/personnummer/personnummer', 'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9'}
| null |
Packagist
|
GHSA-qrvj-274h-hfcg
|
Deserialization of Untrusted Data in topthink/framework
|
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.
|
{'CVE-2021-36567'}
|
2022-03-25T20:42:58Z
|
2021-12-07T00:00:27Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://github.com/top-think/framework', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567', 'https://github.com/top-think/framework/issues/2561'}
| null |
Packagist
|
GHSA-vrgp-3ph6-2wwq
|
SQL Injection in Dolibarr
|
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
|
{'CVE-2021-36625'}
|
2022-04-13T14:57:08Z
|
2022-04-01T00:00:41Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625'}
| null |
Packagist
|
GHSA-322v-p3jc-7hrg
|
Cross-Site Request Forgery in Anchor CMS
|
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts.
|
{'CVE-2022-25576'}
|
2022-03-30T18:05:15Z
|
2022-03-26T00:00:34Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF', 'https://github.com/anchorcms/anchor-cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25576'}
| null |
Packagist
|
GHSA-389p-fchr-q2mg
|
Path Traversal in ImpressCMS
|
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
|
{'CVE-2022-24977'}
|
2022-02-25T17:59:00Z
|
2022-02-15T00:02:47Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://r0.haxors.org/posts?id=8', 'https://github.com/ImpressCMS/impresscms', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2'}
| null |
Packagist
|
GHSA-246r-r2wf-frhx
|
Malicious password-reset in Akaunting
|
Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications.
|
{'CVE-2021-36804'}
|
2021-09-03T15:58:46Z
|
2021-09-01T18:31:36Z
|
HIGH
| null |
{'CWE-640'}
|
{'https://github.com/laravel/laravel/pull/5477', 'https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/', 'https://github.com/laravel/laravel', 'https://www.laravel-enlightn.com/docs/security/host-injection-analyzer.html', 'https://github.com/laravel/laravel/blob/75a7dba9c44ce3555cc57dd1826467839fd9774f/CHANGELOG.md#v844-2020-12-01', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36804'}
| null |
Packagist
|
GHSA-347x-877p-hcwx
|
Information Disclosure in Password Reset
|
In TYPO3 CMS 10.4.0 through 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.
This has been fixed in 10.4.2.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-001
|
{'CVE-2020-11063'}
|
2021-01-08T21:08:47Z
|
2020-05-13T22:19:21Z
|
LOW
| null |
{'CWE-204'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11063', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx'}
| null |
Packagist
|
GHSA-7289-chwj-7h86
|
Path traversal in librenms/librenms
|
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.
|
{'CVE-2021-44278'}
|
2021-12-06T22:05:08Z
|
2021-12-10T20:18:30Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44278'}
| null |
Packagist
|
GHSA-g92x-8m54-p89v
|
Cross-Site Request Forgery in snipe-it
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3858'}
|
2021-10-22T13:56:56Z
|
2021-10-21T17:48:55Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-jx5q-g37m-h5hj
|
Client-Side JavaScript Prototype Pollution in oro/platform
|
### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype`
|
{'CVE-2021-43852'}
|
2022-01-04T22:46:13Z
|
2022-01-06T18:29:51Z
|
MODERATE
| null |
{'CWE-74', 'CWE-1321'}
|
{'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
| null |
Packagist
|
GHSA-g485-29gq-6h2h
|
Sensitive Data Exposure in miniorange_saml
|
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys.
|
{'CVE-2021-36786'}
|
2021-08-30T18:51:00Z
|
2021-09-01T18:36:24Z
|
HIGH
| null |
{'CWE-922'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36786', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}
| null |
Packagist
|
GHSA-7322-jrq4-x5hf
|
File reference keys leads to incorrect hashes on HMAC algorithms
|
### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly.
### Patches
All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative.
### Workarounds
Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys:
```diff
-use Lcobucci\JWT\Signer\Key\LocalFileReference;
+use Lcobucci\JWT\Signer\Key\InMemory;
-$key = LocalFileReference::file(__DIR__ . '/public-key.pem');
+$key = InMemory::file(__DIR__ . '/public-key.pem');
```
|
{'CVE-2021-41106'}
|
2021-09-29T18:04:31Z
|
2021-09-29T17:09:40Z
|
MODERATE
| null |
{'CWE-345'}
|
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://github.com/lcobucci/jwt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}
| null |
Packagist
|
GHSA-9vwf-54m9-gc4f
|
snipe-it is vulnerable to Improper Access Control
|
snipe-it is vulnerable to Improper Access Control
|
{'CVE-2021-4089'}
|
2021-12-15T15:21:35Z
|
2021-12-16T14:32:39Z
|
MODERATE
| null |
{'CWE-863', 'CWE-284'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4089', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
| null |
Packagist
|
GHSA-rphc-h572-2x9f
|
Cross-site Scripting in showdoc/showdoc
|
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround.
|
{'CVE-2022-0960'}
|
2022-03-24T22:38:55Z
|
2022-03-15T00:00:55Z
|
CRITICAL
| null |
{'CWE-79', 'CWE-434'}
|
{'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960'}
| null |
Packagist
|
GHSA-wwgq-9jhf-qgw6
|
Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
|
### Impact
Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
* Sending a test email.
* Generating a node auto-deployment token.
At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system.
### Patches
This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`.
### Workarounds
Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
|
{'CVE-2021-41273'}
|
2021-11-17T21:08:25Z
|
2021-11-18T15:46:57Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'}
| null |
Packagist
|
GHSA-ph62-8768-r87v
|
Arbitrary file delete in ectouch/ectouch
|
ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter.
|
{'CVE-2022-25098'}
|
2022-03-03T22:04:31Z
|
2022-02-25T00:01:04Z
|
CRITICAL
| null | null |
{'https://github.com/dota-st/Vulnerability/blob/master/ECTouchV2.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25098', 'https://github.com/ectouch/ectouch'}
| null |
Packagist
|
GHSA-gvj8-4cj4-h776
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
| null |
2022-04-29T15:40:48Z
|
2022-04-29T15:40:48Z
|
CRITICAL
| null |
{'CWE-281'}
|
{'https://github.com/ibexa/core', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}
| null |
Packagist
|
GHSA-48p3-xfvw-g59c
|
Incorrect Access Control in ImpressCMS
|
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
|
{'CVE-2021-26598'}
|
2022-04-05T19:27:38Z
|
2022-03-29T00:01:16Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://packetstormsecurity.com/files/166403/ImpressCMS-1.4.2-Incorrect-Access-Control.html', 'http://karmainsecurity.com/KIS-2022-03', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26598', 'https://github.com/ImpressCMS/impresscms', 'http://seclists.org/fulldisclosure/2022/Mar/45', 'https://hackerone.com/reports/1081137', 'https://github.com/ImpressCMS/impresscms/pull/967'}
| null |
Packagist
|
GHSA-wc7v-77jr-5c3m
|
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
|
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-3944'}
|
2021-12-03T15:35:34Z
|
2021-12-03T20:38:37Z
|
LOW
| null |
{'CWE-352'}
|
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb', 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'}
| null |
Packagist
|
GHSA-vwxp-9qmf-w299
|
Cross-site Scripting in LiveHelperChat
|
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
|
{'CVE-2022-0394'}
|
2022-02-03T19:18:02Z
|
2022-02-01T00:49:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
| null |
Packagist
|
GHSA-rfjc-xrmf-5vvw
|
Privilege escalation by backend users assigned to the default "Publisher" system role
|
### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0.470) & v1.1.1.
### Workarounds
Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
### References
Reported by [Hoan Hoang](https://github.com/hoanhp)
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
### Threat assessment:
<img width="1098" alt="Screen Shot 2020-10-10 at 1 37 25 PM" src="https://user-images.githubusercontent.com/7253840/95663611-e6326c80-0afd-11eb-8a1e-8b767a7202fb.png">
|
{'CVE-2020-15248'}
|
2021-11-19T13:40:25Z
|
2020-11-23T19:47:27Z
|
LOW
| null |
{'CWE-863', 'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15248', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.