Dataset Viewer
Auto-converted to Parquet
schema_version
string
id
string
modified
timestamp[s]
published
timestamp[s]
aliases
sequence
summary
string
details
string
severity
list
affected
list
references
list
database_specific
dict
1.4.0
GHSA-g86w-v5vg-9gxf
2021-08-25T22:01:25
2020-06-05T16:11:36
[ "CVE-2020-5405" ]
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-config-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduced": null, "fixed": "2.1.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-config-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.2.0", "fixed": null }, { "introduced": null, "fixed": "2.2.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5405" }, { "type": "PACKAGE", "url": "https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server" }, { "type": "WEB", "url": "https://pivotal.io/security/cve-2020-5405" } ]
{ "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-04T19:06:58", "nvd_published_at": "2020-03-05T19:15:00" }
1.4.0
GHSA-89gc-6cw6-4vch
2022-04-26T18:36:08
2018-10-04T19:53:35
[ "CVE-2016-9177" ]
Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI
Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.sparkjava:spark-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.5.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9177" }, { "type": "WEB", "url": "https://github.com/perwendel/spark/issues/700" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0868" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-89gc-6cw6-4vch" }, { "type": "PACKAGE", "url": "https://github.com/perwendel/spark" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2016/Nov/13" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/94218" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:25:07", "nvd_published_at": null }
1.4.0
GHSA-5x3v-2gxr-59m2
2021-04-07T19:55:55
2020-07-01T17:26:15
[ "CVE-2019-17572" ]
Directory traversal in Apache RocketMQ
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-broker" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.2.0", "fixed": null }, { "introduced": null, "fixed": "4.6.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17572" }, { "type": "WEB", "url": "https://github.com/apache/rocketmq/issues/1637" }, { "type": "WEB", "url": "https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E" }, { "type": "WEB", "url": "https://seclists.org/oss-sec/2020/q2/112" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-07-01T17:26:05", "nvd_published_at": null }
1.4.0
GHSA-2q4p-f6gf-mqr5
2023-08-31T18:52:56
2023-07-06T20:53:15
[ "CVE-2023-41044" ]
Graylog server has partial path traversal vulnerability in Support Bundle feature
A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource. Thanks to weiweiwei9811 for reporting this vulnerability and providing detailed information. ### Impact Graylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory. The default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`. Due to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name. The vulnerability would allow the download or deletion of files in the following example directories. - `/var/lib/graylog-server/support-bundle-test` - `/var/lib/graylog-server/support-bundlesdirectory` For the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default. ### Patches The vulnerability is fixed in Graylog version 5.1.3 and later. ### Workarounds Block all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog. - `GET /api/system/debug/support/bundle/download/{filename}` - `DELETE /api/system/debug/support/bundle/{filename}`
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.graylog2:graylog2-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.1.0", "fixed": null }, { "introduced": null, "fixed": "5.1.3" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044" }, { "type": "WEB", "url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938" }, { "type": "PACKAGE", "url": "https://github.com/Graylog2/graylog2-server" }, { "type": "WEB", "url": "https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2023-07-06T20:53:15", "nvd_published_at": "2023-08-31T18:15:09" }
1.4.0
GHSA-h39x-m55c-v55h
2022-04-26T21:49:59
2018-10-17T16:20:45
[ "CVE-2018-12542" ]
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.vertx:vertx-web" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.0.0", "fixed": null }, { "introduced": null, "fixed": "3.5.4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12542" }, { "type": "WEB", "url": "https://github.com/vert-x3/vertx-web/issues/1025" }, { "type": "WEB", "url": "https://github.com/vert-x3/vertx-web/commit/57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b" }, { "type": "WEB", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-h39x-m55c-v55h" }, { "type": "PACKAGE", "url": "https://github.com/vert-x3/vertx-web" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:38:32", "nvd_published_at": null }
1.4.0
GHSA-jqh6-9574-5x22
2023-02-28T20:40:27
2023-01-23T22:05:28
[ "CVE-2023-24057" ]
MITM based Zip Slip in `ca.uhn.hapi.fhir:org.hl7.fhir.core`
### Impact MITM can enable Zip-Slip. ### Vulnerability #### Vulnerability 1: `Scanner.java` There is no validation that the zip file being unpacked has entries that are not maliciously writing outside of the intended destination directory. https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L335-L357 This zip archive is downloaded over HTTP instead of HTTPS, leaving it vulnerable to compromise in-flight. https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L136 ##### Vulnerability 2: `TerminologyCacheManager.java` **Note:** While these links point to only one implementation, both implementations of `TerminologyCacheManager.java` are vulnerable to this as their code seems to be duplicated. - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java While there is validation in this bit of logic that attempts to validate that the zip file doesn't contain malicious entries that escape the destination directory, the guard is insufficient. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L97-L113 This is because the `Utilities.path(String... path)` method does not normalize the path, although it seems to be attempting to do so. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.utilities/src/main/java/org/hl7/fhir/utilities/Utilities.java#L617-L675 The normalization only occurs if the path element starts with a path traversal payload. As an example, calling `Utilities.path("/base", "/child/../test")` will return the string `"/base/child/../test"`. This guard logic can, thus, be easily bypassed: https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L100-L104 Assuming an attacker can control the return value of `ze.getName()`, they can supply a value like `/anything/../../../../zipsip-protection-bypass.txt`. Similarly, an attacker can control the contents of the Zip file via a MITM attack as this logic is used with resources not downloaded over HTTPS. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L66-L73 ### Patches Unknown ### Workarounds Unknown ### References - https://snyk.io/research/zip-slip-vulnerability
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.convertors" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r4b" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r5" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.utilities" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.validation" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.92" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg" }, { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-jqh6-9574-5x22" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24057" }, { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/commit/b50aec59124416b7315a49220cfc3999223414cc" }, { "type": "PACKAGE", "url": "https://github.com/hapifhir/org.hl7.fhir.core" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-01-23T22:05:28", "nvd_published_at": "2023-01-26T21:18:00" }
1.4.0
GHSA-4wjq-69rc-8wcp
2022-11-17T17:45:21
2019-05-02T15:21:34
[ "CVE-2019-0194" ]
Path Traversal in Apache Camel
Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.21.0", "fixed": null }, { "introduced": null, "fixed": "2.21.5" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.22.0", "fixed": null }, { "introduced": null, "fixed": "2.22.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.23.0", "fixed": null }, { "introduced": null, "fixed": "2.23.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194" }, { "type": "WEB", "url": "https://github.com/apache/camel/pull/2700" }, { "type": "PACKAGE", "url": "https://github.com/apache/camel" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/CAMEL-13042" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/04/30/2" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2019-05-02T15:00:07", "nvd_published_at": "2019-04-30T22:29:00" }
1.4.0
GHSA-gwrp-pvrq-jmwv
2024-02-14T20:25:59
2021-04-26T16:04:00
[ "CVE-2021-29425" ]
Path Traversal and Improper Input Validation in Apache Commons IO
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "commons-io:commons-io" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "com.cosium.vet:vet" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0", "fixed": null }, { "introduced": null, "fixed": null } ] } ] }, { "package": { "ecosystem": "Maven", "name": "com.diamondq.common:common-thirdparty.jcasbin" }, "ranges": null }, { "package": { "ecosystem": "Maven", "name": "com.liferay:com.liferay.sass.compiler.jsass" }, "ranges": null }, { "package": { "ecosystem": "Maven", "name": "com.virjar:ratel-api" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0.0", "fixed": null }, { "introduced": null, "fixed": null } ] } ] }, { "package": { "ecosystem": "Maven", "name": "net.hasor:cobble-lang" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.4.1", "fixed": null }, { "introduced": null, "fixed": null } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.commons:commons-io" }, "ranges": null }, { "package": { "ecosystem": "Maven", "name": "org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-io" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.4", "fixed": null }, { "introduced": null, "fixed": null } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.checkerframework.annotatedlib:commons-io" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.6", "fixed": null }, { "introduced": null, "fixed": "2.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.smartboot.servlet:servlet-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.1.9", "fixed": null }, { "introduced": null, "fixed": null } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220210-0004" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "https://arxiv.org/pdf/2306.05534.pdf" }, { "type": "WEB", "url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2021-29425" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/IO-556" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-20", "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-04-26T15:21:31", "nvd_published_at": "2021-04-13T07:15:00" }
1.4.0
GHSA-rcvx-rmvf-mxch
2021-04-06T21:53:29
2022-02-09T22:19:44
[ "CVE-2020-27219" ]
Cross-site Scripting in Eclipse Hawkbit
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.eclipse.hawkbit:hawkbit-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "0.3.0M7" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27219" }, { "type": "WEB", "url": "https://github.com/eclipse/hawkbit/issues/1067" }, { "type": "WEB", "url": "https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9" }, { "type": "WEB", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-04-06T21:53:29", "nvd_published_at": "2021-01-14T23:15:00" }
1.4.0
GHSA-6pqf-c99p-758v
2023-06-30T20:41:50
2023-06-30T20:41:50
[ "CVE-2023-36471" ]
org.xwiki.commons:xwiki-commons-xml's HTML sanitizer allows form elements in restricted
### Impact The HTML sanitizer that is included in XWiki since version 14.6RC1 allowed form and input HTML tags. In the context of XWiki, this allows an attacker without script right to either create forms that can be used for phishing attacks or also in the context of a sheet, the attacker could add an input like `{{html}}<input type="hidden" name="content" value="{{groovy}}println(&quot;Hello from Groovy!&quot;)" />{{/html}}` that would allow remote code execution when it is submitted by an admin (the sheet is rendered as part of the edit form). The attacker would need to ensure that the edit form looks plausible, though, which can be non-trivial as without script right the attacker cannot display the regular content of the document. ### Patches This has been patched in XWiki 14.10.6 and 15.2RC1 by removing the central form-related tags from the list of allowed tags. ### Workarounds An admin can manually disallow the tags by adding `form, input, select, textarea, button` to the configuration option `xml.htmlElementSanitizer.forbidTags` in the `xwiki.properties` configuration file. ### References * https://jira.xwiki.org/browse/XCOMMONS-2634 * https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "14.6-rc-1", "fixed": null }, { "introduced": null, "fixed": "14.10.6" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "15.0-rc-1", "fixed": null }, { "introduced": null, "fixed": "15.2-rc-1" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36471" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-commons" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XCOMMONS-2634" } ]
{ "cwe_ids": [ "CWE-74", "CWE-79" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-06-30T20:41:50", "nvd_published_at": "2023-06-29T20:15:10" }
1.4.0
GHSA-vpgf-fgm8-gxr2
2022-11-01T13:29:32
2022-10-28T12:00:33
[ "CVE-2022-26884" ]
Apache DolphinScheduler vulnerable to Path Traversal
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dolphinscheduler:dolphinscheduler" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.0.6" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26884" }, { "type": "PACKAGE", "url": "https://github.com/apache/dolphinscheduler" }, { "type": "WEB", "url": "https://github.com/apache/dolphinscheduler/releases/tag/2.0.6" }, { "type": "WEB", "url": "https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jzrgmw2htyyb9c" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/10/28/2" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-10-31T19:37:13", "nvd_published_at": "2022-10-28T08:15:00" }
1.4.0
GHSA-jv74-f9pj-xp3f
2022-11-17T19:14:08
2018-10-16T23:07:57
[ "CVE-2018-8041" ]
Apache Camel's Mail is vulnerable to path traversal
Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-mail" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.20.0", "fixed": null }, { "introduced": null, "fixed": "2.20.4" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-mail" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.21.0", "fixed": null }, { "introduced": null, "fixed": "2.21.2" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.camel:camel-mail" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.22.0", "fixed": null }, { "introduced": null, "fixed": "2.22.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8041" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4" }, { "type": "WEB", "url": "https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3768" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-jv74-f9pj-xp3f" }, { "type": "PACKAGE", "url": "https://github.com/apache/camel" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/CAMEL-12630" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105352" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:44:10", "nvd_published_at": null }
1.4.0
GHSA-qmfc-6www-fjqw
2022-03-18T17:57:04
2022-03-18T17:57:04
[ "CVE-2021-30181" ]
Code injection in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.alibaba:dubbo" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.5.0", "fixed": null }, { "introduced": null, "fixed": "2.6.9" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.dubbo:dubbo" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.5.0", "fixed": null }, { "introduced": null, "fixed": "2.7.10" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30181" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-06-02T20:15:20", "nvd_published_at": "2021-06-01T14:15:00" }
1.4.0
GHSA-683w-6h9j-57wq
2021-09-01T22:41:27
2018-10-18T17:21:47
[ "CVE-2016-10006" ]
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp.antisamy:antisamy" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.5.5" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10006" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/issues/2" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-683w-6h9j-57wq" }, { "type": "PACKAGE", "url": "https://github.com/nahsra/antisamy" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/95101" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037532" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:18:23", "nvd_published_at": null }
1.4.0
GHSA-rc2q-x9mf-w3vf
2023-05-09T17:53:32
2022-11-19T21:30:25
[ "CVE-2022-4065" ]
TestNG is vulnerable to Path Traversal
### Impact Affected by this vulnerability is the function `testngXmlExistsInJar` of the file `testng-core/src/main/java/org/testng/JarFileUtils.java` of the component `XML File Parser`. The manipulation leads to path traversal only for `.xml`, `.yaml` and `.yml` files by default. The attack implies running an unsafe test JAR. However since that JAR can also contain executable code itself, the path traversal is unlikely to be the main attack. ### Patches A patch is available in [version 7.7.0](https://github.com/cbeust/testng/releases/tag/7.7.0) at commit 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The patch was pushed into the master branch but no releases have yet been made with the patch included. A backport of the fix is available in [version 7.5.1]((https://github.com/cbeust/testng/releases/tag/7.5.1) for Java 8 projects. ### Workaround * Specify which tests to run when invoking TestNG by configuring them on the CLI or in the build tool controlling the run. * Do not run tests with untrusted JARs on the classpath, this includes pull requests on open source projects.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.testng:testng" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "6.13", "fixed": null }, { "introduced": null, "fixed": "7.5.1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.testng:testng" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "7.6.0", "fixed": null }, { "introduced": null, "fixed": "7.7.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4065" }, { "type": "WEB", "url": "https://github.com/cbeust/testng/pull/1596" }, { "type": "WEB", "url": "https://github.com/cbeust/testng/pull/2806" }, { "type": "WEB", "url": "https://github.com/testng-team/testng/pull/2899" }, { "type": "WEB", "url": "https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b" }, { "type": "PACKAGE", "url": "https://github.com/cbeust/testng" }, { "type": "WEB", "url": "https://github.com/cbeust/testng/releases/tag/7.7.0" }, { "type": "WEB", "url": "https://github.com/cbeust/testng/releases/tag/7.7.1" }, { "type": "WEB", "url": "https://github.com/testng-team/testng/releases/tag/7.5.1" }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.214027" }, { "type": "WEB", "url": "https://vuldb.com/?id.214027" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-12-02T22:31:06", "nvd_published_at": "2022-11-19T19:15:00" }
1.4.0
GHSA-g8jj-899q-8x3j
2021-05-13T19:52:04
2022-02-10T23:04:13
[ "CVE-2020-13973" ]
Cross-site scripting in json-sanitizer
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.mikesamuel:json-sanitizer" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.2.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973" }, { "type": "WEB", "url": "https://github.com/OWASP/json-sanitizer/pull/20" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-05-13T19:52:04", "nvd_published_at": "2020-06-09T04:15:00" }
1.4.0
GHSA-3wfj-vh84-732p
2023-12-20T19:05:58
2022-05-14T01:14:52
[ "CVE-2014-3576" ]
Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ
The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.activemq:activemq-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.11.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3576" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/00921f22ff9a8792d7663ef8fadd4823402a6324" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/f07e6a53216f9388185ac2b39f366f3bfd6a8a55" }, { "type": "PACKAGE", "url": "https://github.com/apache/activemq" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "http://activemq.2283324.n4.nabble.com/About-CVE-2014-3576-tp4699628.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3330" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/536862/100/0/threaded" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-07-07T22:40:47", "nvd_published_at": "2015-08-14T18:59:00" }
1.4.0
GHSA-8m5h-hrqm-pxm2
2022-04-27T21:09:43
2022-04-27T21:09:43
[ "CVE-2022-23457" ]
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. ### Patches This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details. ### Workarounds Yes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended. ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp.esapi:esapi" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.3.0.0" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23457" }, { "type": "WEB", "url": "https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a" }, { "type": "PACKAGE", "url": "https://github.com/ESAPI/esapi-java-legacy" }, { "type": "WEB", "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md" }, { "type": "WEB", "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230127-0014" }, { "type": "ADVISORY", "url": "https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-04-27T21:09:43", "nvd_published_at": "2022-04-25T20:15:00" }
1.4.0
GHSA-f93p-f762-vr53
2021-06-15T17:28:04
2020-06-10T20:02:33
[ "CVE-2019-17573" ]
Reflected Cross-Site Scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:apache-cxf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.2.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:apache-cxf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.3.0", "fixed": null }, { "introduced": null, "fixed": "3.3.5" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.2.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.3.0", "fixed": null }, { "introduced": null, "fixed": "3.3.5" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" }, { "type": "WEB", "url": "https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2020/11/12/2" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-09T19:27:28", "nvd_published_at": "2020-01-16T18:15:00" }
1.4.0
GHSA-jc35-q369-45pv
2022-02-08T22:01:20
2022-02-09T22:51:56
[ "CVE-2020-17530" ]
Remote code execution in Apache Struts
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.struts:struts2-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0", "fixed": null }, { "introduced": null, "fixed": "2.5.26" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530" }, { "type": "WEB", "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210115-0005" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" } ]
{ "cwe_ids": [ "CWE-917", "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-04-09T21:42:05", "nvd_published_at": "2020-12-11T02:15:00" }
1.4.0
GHSA-w4m2-qmh3-2g8f
2023-10-25T16:57:27
2023-10-19T18:30:30
[ "CVE-2023-45277" ]
Yamcs Path Traversal vulnerability
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.yamcs:yamcs" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.8.7" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45277" }, { "type": "PACKAGE", "url": "https://github.com/yamcs/yamcs" }, { "type": "WEB", "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "type": "WEB", "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-10-19T20:02:23", "nvd_published_at": "2023-10-19T17:15:10" }
1.4.0
GHSA-9hhc-pj4w-w5rv
2023-09-26T13:59:05
2023-03-01T17:38:56
[ "CVE-2022-4137" ]
Keycloak Cross-site Scripting on OpenID connect login service
A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "20.0.5" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-9hhc-pj4w-w5rv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/pull/16774" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/commit/30d0e9d22dae51392e5a3748a1c68c116667359a" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:1043" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:1044" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:1045" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:1049" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-4137" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" }, { "type": "PACKAGE", "url": "https://github.com/keycloak/keycloak" } ]
{ "cwe_ids": [ "CWE-116", "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-03-01T17:38:56", "nvd_published_at": "2023-09-25T20:15:09" }
1.4.0
GHSA-jpv3-g4cc-6vfx
2024-03-14T22:09:43
2019-04-02T15:46:42
[ "CVE-2019-0222" ]
Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.activemq:activemq-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0", "fixed": null }, { "introduced": null, "fixed": "5.15.9" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/98b9f2e" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/f78c0962ffb46fae3397eed6b7ec1e6e15045031" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "type": "WEB", "url": "https://web.archive.org/web/20190404065432/http://www.securityfocus.com/bid/107622" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190502-0006" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E" }, { "type": "PACKAGE", "url": "https://github.com/apache/activemq" }, { "type": "WEB", "url": "http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/03/27/2" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:44:05", "nvd_published_at": "2019-03-28T22:29:00" }
1.4.0
GHSA-g8q8-fggx-9r3q
2023-01-25T21:37:00
2022-12-13T19:44:56
[ "CVE-2022-3782" ]
Keycloak vulnerable to path traversal via double URL encoding
Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "20.0.2" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-g8q8-fggx-9r3q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/pull/15982/commits/1987c942f527b9f3bbf2a86ba71ba8ae0154ac37" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-3782" }, { "type": "PACKAGE", "url": "https://github.com/keycloak/keycloak" } ]
{ "cwe_ids": [ "CWE-177", "CWE-22" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-12-13T19:44:56", "nvd_published_at": "2023-01-13T06:15:00" }
1.4.0
GHSA-r969-8v3h-23v9
2023-08-03T21:41:04
2023-07-29T09:30:15
[ "CVE-2023-36542" ]
Apache NiFi Code Injection vulnerability
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-cdc-mysql-bundle" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-jms-processors" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-standard-processors" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-dbcp-service" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-hikari-dbcp-service" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-hadoop-dbcp-service" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-hbase_2-client-service" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-record-serialization-services" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.23.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36542" }, { "type": "WEB", "url": "https://github.com/apache/nifi/commit/532578799c" }, { "type": "PACKAGE", "url": "https://github.com/apache/nifi" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/NIFI-11744" }, { "type": "WEB", "url": "https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof" }, { "type": "WEB", "url": "https://nifi.apache.org/security.html#CVE-2023-36542" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/07/29/1" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-07-31T22:03:10", "nvd_published_at": "2023-07-29T08:15:48" }
1.4.0
GHSA-cghx-9gcr-r42x
2022-10-07T20:36:09
2021-01-29T18:12:54
[ "CVE-2020-8570" ]
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.kubernetes:client-java" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "9.0.2" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.kubernetes:client-java" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "10.0.0", "fixed": null }, { "introduced": null, "fixed": "10.0.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8570" }, { "type": "WEB", "url": "https://github.com/kubernetes-client/java/issues/1491" }, { "type": "WEB", "url": "https://github.com/kubernetes-client/java/pull/1450" }, { "type": "WEB", "url": "https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589" }, { "type": "PACKAGE", "url": "https://github.com/kubernetes-client/java" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-01-22T18:25:27", "nvd_published_at": "2021-01-21T17:15:00" }
1.4.0
GHSA-98g7-rxmf-rrxm
2022-09-08T14:19:24
2022-07-15T05:17:35
[ "CVE-2021-4178" ]
fabric8 kubernetes-client vulnerable
fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0-beta-1", "fixed": null }, { "introduced": null, "fixed": "5.0.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.1.0", "fixed": null }, { "introduced": null, "fixed": "5.1.2" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.2.0", "fixed": null }, { "introduced": null, "fixed": "5.3.2" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.5.0", "fixed": null }, { "introduced": null, "fixed": "5.7.4" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.8.0", "fixed": null }, { "introduced": null, "fixed": "5.8.1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.9.0", "fixed": null }, { "introduced": null, "fixed": "5.10.2" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.fabric8:kubernetes-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.11.0", "fixed": null }, { "introduced": null, "fixed": "5.11.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178" }, { "type": "WEB", "url": "https://github.com/fabric8io/kubernetes-client/issues/3653" }, { "type": "WEB", "url": "https://github.com/fabric8io/kubernetes-client/commit/445103004d1ed3153d5abb272473451d05891e39" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/cve-2021-4178" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "type": "PACKAGE", "url": "https://github.com/fabric8io/kubernetes-client" }, { "type": "WEB", "url": "https://www.mend.io/vulnerability-database/CVE-2021-4178" } ]
{ "cwe_ids": [ "CWE-502", "CWE-94" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-07-15T05:17:35", "nvd_published_at": "2022-08-24T16:15:00" }
1.4.0
GHSA-2rpm-4x8c-pvqg
2022-06-30T14:43:07
2022-05-13T01:35:04
[ "CVE-2018-1002202" ]
Improper Limitation of a Pathname to a Restricted Directory in Zip4j
zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "net.lingala.zip4j:zip4j" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.3.3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002202" }, { "type": "WEB", "url": "https://github.com/snyk/zip-slip-vulnerability" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-NETLINGALAZIP4J-31679" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03895en_us" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-06-30T14:43:07", "nvd_published_at": "2018-07-25T17:29:00" }
1.4.0
GHSA-v84g-cf5j-xjqx
2022-02-08T20:38:52
2022-02-08T00:00:34
[ "CVE-2022-22931" ]
Path Traversal in Apache James Server
Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.james:james-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.6.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22931" }, { "type": "WEB", "url": "https://github.com/apache/james-project/pull/877" }, { "type": "WEB", "url": "https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7" }, { "type": "PACKAGE", "url": "https://github.com/apache/james-project" }, { "type": "WEB", "url": "https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2022/02/07/1" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-02-08T20:38:52", "nvd_published_at": "2022-02-07T19:15:00" }
1.4.0
GHSA-9654-pr4f-gh6m
2023-12-15T22:19:57
2023-03-10T22:15:55
[ "CVE-2023-28465" ]
HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057
### Impact Zip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability. This issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories. To demonstrate the vulnerability, consider `userControlled.getCanonicalPath().startsWith("/usr/out")` will allow an attacker to access a directory with a name like `/usr/outnot`. ### Why? To demonstrate this vulnerability, consider `"/usr/outnot".startsWith("/usr/out")`. The check is bypassed although `/outnot` is not under the `/out` directory. It's important to understand that the terminating slash may be removed when using various `String` representations of the `File` object. For example, on Linux, `println(new File("/var"))` will print `/var`, but `println(new File("/var", "/")` will print `/var/`; however, `println(new File("/var", "/").getCanonicalPath())` will print `/var`. ### The Fix Comparing paths with the `java.nio.files.Path#startsWith` will adequately protect againts this vulnerability. For example: `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY)` or `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath())` ### Other Examples - [CVE-2022-31159](https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3) - aws/aws-sdk-java - [CVE-2022-23457](https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/) - ESAPI/esapi-java-legacy ### Vulnerability https://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105 While `getAbsolutePath` will return a normalized path, because the string `path` is not slash terminated, the guard can be bypassed to write the contents of the Zip file to a sibling directory of the cache directory. ### Patches All org.hl7.fhir.core libraries should be updated to 5.6.106. - https://github.com/hapifhir/org.hl7.fhir.core/pull/1162 ### Workarounds Unknown ### References * https://snyk.io/research/zip-slip-vulnerability
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.convertors" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r4b" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r5" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.utilities" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "ca.uhn.hapi.fhir:org.hl7.fhir.validation" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.6.106" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-9654-pr4f-gh6m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28465" }, { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/pull/1162" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9654-pr4f-gh6m" }, { "type": "PACKAGE", "url": "https://github.com/hapifhir/org.hl7.fhir.core" }, { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105" }, { "type": "WEB", "url": "https://github.com/hapifhir/org.hl7.fhir.core/releases/tag/5.6.106" }, { "type": "WEB", "url": "https://www.smilecdr.com/our-blog" }, { "type": "WEB", "url": "https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-03-10T22:15:55", "nvd_published_at": "2023-12-12T17:15:07" }
1.4.0
GHSA-vp37-2f9p-3vr3
2022-05-04T03:59:45
2022-04-23T00:03:04
[ "CVE-2022-29577" ]
Cross-site Scripting in OWASP AntiSamy
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp.antisamy:antisamy" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.6.7" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29577" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0" }, { "type": "PACKAGE", "url": "https://github.com/nahsra/antisamy" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.7" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-04-26T17:47:34", "nvd_published_at": "2022-04-21T23:15:00" }
1.4.0
GHSA-h28c-453m-h9xm
2022-08-30T20:20:37
2022-08-19T00:00:20
[ "CVE-2022-37422" ]
Path Traversal in Payara
Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "fish.payara.api:payara-bom" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.2022.3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37422" }, { "type": "WEB", "url": "https://blog.payara.fish/august-community-5-release" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-08-30T20:20:37", "nvd_published_at": "2022-08-18T19:15:00" }
1.4.0
GHSA-w6g3-v46q-5p28
2021-09-21T17:58:38
2018-10-17T15:49:58
[ "CVE-2018-11762" ]
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.tika:tika-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.9", "fixed": null }, { "introduced": null, "fixed": "1.19" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11762" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-w6g3-v46q-5p28" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105515" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:59:47", "nvd_published_at": null }
1.4.0
GHSA-hfpg-gqjw-779m
2022-06-30T18:25:33
2022-05-14T01:27:45
[ "CVE-2018-1000129" ]
Cross-site Scripting in Jolokia agent
An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jolokia:jolokia-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.3.7", "fixed": null }, { "introduced": null, "fixed": "1.5.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000129" }, { "type": "WEB", "url": "https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3817" }, { "type": "PACKAGE", "url": "https://github.com/rhuss/jolokia" }, { "type": "WEB", "url": "https://github.com/rhuss/jolokia/releases/tag/v1.5.0" }, { "type": "WEB", "url": "https://jolokia.org/#Security_fixes_with_1.5.0" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-06-30T18:25:33", "nvd_published_at": "2018-03-14T13:29:00" }
1.4.0
GHSA-3pqg-4rqg-pg9g
2022-05-04T04:00:41
2022-04-23T00:03:04
[ "CVE-2022-28367" ]
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp.antisamy:antisamy" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.6.6" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28367" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae" }, { "type": "PACKAGE", "url": "https://github.com/nahsra/antisamy" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-04-26T19:45:44", "nvd_published_at": "2022-04-21T23:15:00" }
1.4.0
GHSA-q44v-xc3g-v7jq
2022-11-17T19:41:38
2018-10-18T17:22:11
[ "CVE-2017-14735" ]
OWASP AntiSamy Cross-site Scripting vulnerability
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of &colon; to construct a javascript: URL.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp.antisamy:antisamy" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.5.7" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14735" }, { "type": "WEB", "url": "https://github.com/nahsra/antisamy/issues/10" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-q44v-xc3g-v7jq" }, { "type": "PACKAGE", "url": "https://github.com/nahsra/antisamy" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105656" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:50:52", "nvd_published_at": "2017-09-25T21:29:00" }
1.4.0
GHSA-663w-2xp3-5739
2023-11-01T06:06:17
2023-10-25T21:02:49
[ "CVE-2023-37908" ]
org.xwiki.rendering:xwiki-rendering-xml Improper Neutralization of Invalid Characters in Identifiers in Web Pages vulnerability
### Impact The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute names. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki: ``` [[Link1>>https://XWiki.example.com||/onmouseover="alert('XSS1')"]] ``` When a user moves the mouse over this link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. While this attribute was correctly recognized as not allowed, the attribute was still printed with a prefix `data-xwiki-translated-attribute-` without further cleaning or validation. Note that while versions below 14.6 are not vulnerable to this particular vulnerability, they are still vulnerable to XSS through attributes in XWiki syntax, see [the corresponding advisory](https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp). ### Patches This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by removing characters not allowed in data attributes and then validating the cleaned attribute again. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://jira.xwiki.org/browse/XRENDERING-697 * https://github.com/xwiki/xwiki-rendering/commit/f4d5acac451dccaf276e69f0b49b72221eef5d2f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:[email protected])
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "14.6-rc-1", "fixed": null }, { "introduced": null, "fixed": "14.10.4" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-663w-2xp3-5739" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37908" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-rendering/commit/f4d5acac451dccaf276e69f0b49b72221eef5d2f" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-rendering" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XRENDERING-697" } ]
{ "cwe_ids": [ "CWE-79", "CWE-83", "CWE-86" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-10-25T21:02:49", "nvd_published_at": "2023-10-25T18:17:28" }
1.4.0
GHSA-g9fx-6j5c-grmw
2023-05-25T13:24:03
2022-02-16T00:01:36
[ "CVE-2022-25174" ]
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "544.vff04fa68714d", "fixed": null }, { "introduced": null, "fixed": "561.va" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.19", "fixed": null }, { "introduced": null, "fixed": "2.21.1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.18.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25174" }, { "type": "WEB", "url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/ace0de3c2d691662021ea10306eeb407da6b6365" }, { "type": "WEB", "url": "https://github.com/CVEProject/cvelist/blob/e19344451ce1c4a4181b9f094b8fd38cd8d86c9f/2022/25xxx/CVE-2022-25174.json" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-06-20T22:48:09", "nvd_published_at": "2022-02-15T17:15:00" }
1.4.0
GHSA-pj84-qjm3-77mg
2022-07-21T16:18:43
2022-02-16T00:01:36
[ "CVE-2022-25175" ]
Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses distinct checkout directories per SCM for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins.workflow:workflow-multibranch" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "707.v71c3f0a_6ccdb" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25175" }, { "type": "WEB", "url": "https://github.com/jenkinsci/workflow-multibranch-plugin/commit/71c3f0a6ccdb2ba43f43686826b0d62160df85e8" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-06-20T22:46:22", "nvd_published_at": "2022-02-15T17:15:00" }
1.4.0
GHSA-m3jr-cvhj-f35j
2023-04-25T21:00:29
2023-04-12T20:38:17
[ "CVE-2023-29201" ]
org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability
### Impact The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). An example are anonymous comments in XWiki where the HTML macro filters HTML using restricted mode: ```javascript {{html}} <a href='' onclick='alert(1)'>XSS</a> {{/html}} ``` When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. ### Patches This problem has been patched in XWiki 14.6 RC1 with the introduction of a filter with allowed HTML elements and attributes that is enabled in restricted mode. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://github.com/xwiki/xwiki-commons/commit/b11eae9d82cb53f32962056b5faa73f3720c6182 - the patch with the filter * https://github.com/xwiki/xwiki-commons/commit/4a185e0594d90cd4916d60aa60bb4333dc5623b2 - the patch with the definitions what is allowed * https://jira.xwiki.org/browse/XWIKI-9118 - the security issue with the HTML macro * https://jira.xwiki.org/browse/XCOMMONS-1680 - the issue regarding a definition of what is allowed HTML * https://jira.xwiki.org/browse/XCOMMONS-2426 - the issue regarding the filter that fixes the security issue ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:[email protected])
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.2-milestone-1", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m3jr-cvhj-f35j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29201" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/4a185e0594d90cd4916d60aa60bb4333dc5623b2" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/b11eae9d82cb53f32962056b5faa73f3720c6182" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-commons" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XCOMMONS-1680" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XCOMMONS-2426" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-9118" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-04-12T20:38:17", "nvd_published_at": "2023-04-15T15:15:00" }
1.4.0
GHSA-fp35-xrrr-3gph
2022-11-02T21:45:12
2022-11-01T19:00:29
[ "CVE-2022-34662" ]
Apache DolphinScheduler vulnerable to Path Traversal
When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dolphinscheduler:dolphinscheduler" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.0.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34662" }, { "type": "PACKAGE", "url": "https://github.com/apache/dolphinscheduler" }, { "type": "WEB", "url": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-11-01T21:04:38", "nvd_published_at": "2022-11-01T16:15:00" }
1.4.0
GHSA-3gx9-37ww-9qw6
2022-08-11T21:37:05
2022-03-04T00:00:15
[ "CVE-2022-22947" ]
Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured
In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-gateway" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.0.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-gateway" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.1.0", "fixed": null }, { "introduced": null, "fixed": "3.1.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22947" }, { "type": "WEB", "url": "https://tanzu.vmware.com/security/cve-2022-22947" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html" } ]
{ "cwe_ids": [ "CWE-917", "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-03-04T21:06:22", "nvd_published_at": "2022-03-03T22:15:00" }
1.4.0
GHSA-3g5w-6pw7-6hrp
2023-01-28T01:19:43
2023-01-27T12:30:29
[ "CVE-2022-2712" ]
Path Traversal In Eclipse GlassFish
In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.glassfish.main.web:web" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.1.0", "fixed": null }, { "introduced": null, "fixed": "7.0.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2712" }, { "type": "WEB", "url": "https://github.com/eclipse-ee4j/glassfish/pull/24077" }, { "type": "WEB", "url": "https://bugs.eclipse.org/580502" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-28T01:19:43", "nvd_published_at": "2023-01-27T10:15:00" }
1.4.0
GHSA-x3cq-8f32-5f63
2023-07-12T14:46:52
2023-07-06T21:15:04
[ "CVE-2023-33246" ]
Apache RocketMQ may have remote code execution vulnerability when using update configuration function
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-broker" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0", "fixed": null }, { "introduced": null, "fixed": "5.1.1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-namesrv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.0.0", "fixed": null }, { "introduced": null, "fixed": "4.9.6" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-controller" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0", "fixed": null }, { "introduced": null, "fixed": "5.1.1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-namesrv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0", "fixed": null }, { "introduced": null, "fixed": "5.1.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246" }, { "type": "WEB", "url": "https://github.com/apache/rocketmq/commit/9d411cf04a695e7a3f41036e8377b0aa544d754d" }, { "type": "WEB", "url": "https://github.com/apache/rocketmq/commit/c3ada731405c5990c36bf58d50b3e61965300703" }, { "type": "PACKAGE", "url": "https://github.com/apache/rocketmq" }, { "type": "WEB", "url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/07/12/1" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-07-06T23:48:22", "nvd_published_at": "2023-05-24T15:15:09" }
1.4.0
GHSA-m9vj-44f3-78xw
2022-06-03T15:46:13
2022-06-01T00:00:35
[ "CVE-2022-23082" ]
Path traversal in CureKit
CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.whitesource:curekit" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0.1", "fixed": null }, { "introduced": null, "fixed": "1.1.4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23082" }, { "type": "WEB", "url": "https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6" }, { "type": "PACKAGE", "url": "https://github.com/whitesource/CureKit" }, { "type": "WEB", "url": "https://www.mend.io/vulnerability-database/CVE-2022-23082" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-06-03T15:45:42", "nvd_published_at": "2022-05-31T15:15:00" }
1.4.0
GHSA-76qr-mmh8-cp8f
2021-09-02T19:24:32
2018-10-19T16:56:00
[ "CVE-2018-9159" ]
Moderate severity vulnerability that affects com.sparkjava:spark-core
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.sparkjava:spark-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.7.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9159" }, { "type": "WEB", "url": "https://github.com/perwendel/spark/issues/981" }, { "type": "WEB", "url": "https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668" }, { "type": "WEB", "url": "https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd" }, { "type": "WEB", "url": "https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2020" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2405" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-76qr-mmh8-cp8f" }, { "type": "PACKAGE", "url": "https://github.com/perwendel/spark" }, { "type": "WEB", "url": "http://sparkjava.com/news#spark-272-released" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:21:39", "nvd_published_at": null }
1.4.0
GHSA-pffw-p2q5-w6vh
2022-09-17T00:13:09
2019-04-08T16:23:36
[ "CVE-2019-0225" ]
Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-war" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0225" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-pffw-p2q5-w6vh" }, { "type": "WEB", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/03/26/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/107627" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:49:01", "nvd_published_at": null }
1.4.0
GHSA-43fw-536j-w37j
2023-10-25T16:57:42
2023-10-19T18:30:30
[ "CVE-2023-45278" ]
Yamcs API Directory Traversal vulnerability
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.yamcs:yamcs" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "5.8.7" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45278" }, { "type": "PACKAGE", "url": "https://github.com/yamcs/yamcs" }, { "type": "WEB", "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7" }, { "type": "WEB", "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-10-19T20:03:18", "nvd_published_at": "2023-10-19T17:15:10" }
1.4.0
GHSA-p9m8-27x8-rg87
2021-11-15T22:23:17
2021-11-15T23:27:11
[ "CVE-2021-41269" ]
Critical vulnerability found in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version was released. Please upgrade to version 9.1.6. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: Open an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.cronutils:cron-utils" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "9.1.6" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269" }, { "type": "WEB", "url": "https://github.com/jmrozanec/cron-utils/issues/461" }, { "type": "WEB", "url": "https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da" }, { "type": "WEB", "url": "https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da" }, { "type": "PACKAGE", "url": "https://github.com/jmrozanec/cron-utils" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-11-15T22:23:17", "nvd_published_at": "2021-11-15T21:15:00" }
1.4.0
GHSA-px42-mr8m-cpgh
2023-08-07T20:27:41
2022-05-17T19:57:06
[ "CVE-2014-3656" ]
JBoss KeyCloak Cross-site Scripting Vulnerability
If a JBoss Keycloak application was configured to use `*` as a permitted web origin in the Keycloak administrative console, crafted requests to the `login-status-iframe.html` endpoint could inject arbitrary Javascript into the generated HTML code via the "origin" query parameter, leading to a cross-site scripting (XSS) vulnerability.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.1.0.Beta1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3656" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/commit/63b41e2548cbc20bd3758e34a82d880e177bf24c" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/cve-2014-3656" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3656" }, { "type": "WEB", "url": "https://issues.jboss.org/browse/KEYCLOAK-703" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGKEYCLOAK-31231" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-08-07T20:27:41", "nvd_published_at": "2019-12-10T14:15:00" }
1.4.0
GHSA-9hr3-j9mc-xmq2
2022-05-20T21:17:03
2022-05-03T00:00:44
[ "CVE-2022-25842" ]
Path Traversal in com.alibaba.oneagent:one-java-agent-plugin
All versions of package `com.alibaba.oneagent:one-java-agent-plugin` are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. `../../evil.exe`). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:L" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.alibaba.oneagent:one-java-agent-plugin" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "0.0.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25842" }, { "type": "WEB", "url": "https://github.com/alibaba/one-java-agent/pull/29" }, { "type": "WEB", "url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf" }, { "type": "WEB", "url": "https://github.com/alibaba/one-java-agent/pull/29/commits/b5b437f9f4c8cbfe7bdbe266e975a4bd513c13fe" }, { "type": "PACKAGE", "url": "https://github.com/alibaba/one-java-agent" }, { "type": "WEB", "url": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874" } ]
{ "cwe_ids": [ "CWE-22", "CWE-29" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-05-20T21:17:03", "nvd_published_at": "2022-05-01T16:15:00" }
1.4.0
GHSA-vjw7-6gfq-6wf5
2021-04-22T22:08:15
2022-02-10T20:28:57
[ "CVE-2019-17640" ]
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.vertx:vertx-web" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.0.0", "fixed": null }, { "introduced": null, "fixed": "3.9.4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17640" }, { "type": "WEB", "url": "https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4" }, { "type": "WEB", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://mvnrepository.com/artifact/io.vertx/vertx-web" } ]
{ "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-04-22T22:08:15", "nvd_published_at": "2020-10-15T21:15:00" }
1.4.0
GHSA-3p62-6fjh-3p5h
2023-07-07T21:47:57
2023-06-30T20:30:50
[ "CVE-2022-4361" ]
Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC
AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-services" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "21.1.2" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4361" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151618" }, { "type": "PACKAGE", "url": "https://github.com/keycloak/keycloak" } ]
{ "cwe_ids": [ "CWE-79", "CWE-81" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-06-30T20:30:50", "nvd_published_at": "2023-07-07T20:15:09" }
1.4.0
GHSA-pmhc-2g4f-85cg
2023-09-15T18:29:37
2023-07-24T21:30:39
[ "CVE-2023-34478" ]
Path Traversal in Apache Shiro
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.shiro:shiro-web" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.12.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.shiro:shiro-web" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0-alpha-1", "fixed": null }, { "introduced": null, "fixed": "2.0.0-alpha-3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34478" }, { "type": "WEB", "url": "https://github.com/apache/shiro/commit/c3ede3f94efb442acb0795714a022c2c121d1da0" }, { "type": "PACKAGE", "url": "https://github.com/apache/shiro" }, { "type": "WEB", "url": "https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230915-0005" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/07/24/4" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-07-25T13:51:45", "nvd_published_at": "2023-07-24T19:15:10" }
1.4.0
GHSA-jpxj-vgq5-prjc
2023-10-27T16:23:06
2022-01-13T00:01:03
[ "CVE-2022-20617" ]
OS command execution vulnerability in Jenkins Docker Commons Plugin
Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:docker-commons" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.18" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20617" }, { "type": "WEB", "url": "https://github.com/jenkinsci/docker-commons-plugin/commit/c069b79c31c5aa80a01b0c462f0dc6b41751f059" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/docker-commons-plugin" }, { "type": "WEB", "url": "https://plugins.jenkins.io/docker-commons" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/01/12/6" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-04-29T04:27:21", "nvd_published_at": "2022-01-12T20:15:00" }
1.4.0
GHSA-qwxx-xww6-8q8m
2024-02-21T00:17:58
2024-02-20T12:30:58
[ "CVE-2023-49109" ]
Remote Code Execution in Apache Dolphinscheduler
This issue affects Apache DolphinScheduler 3.0.0 before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dolphinscheduler:dolphinscheduler" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.0.0", "fixed": null }, { "introduced": null, "fixed": "3.2.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49109" }, { "type": "WEB", "url": "https://github.com/apache/dolphinscheduler/pull/14991" }, { "type": "PACKAGE", "url": "https://github.com/apache/dolphinscheduler" }, { "type": "WEB", "url": "https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8" }, { "type": "WEB", "url": "https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/20/4" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-02-21T00:17:58", "nvd_published_at": "2024-02-20T10:15:07" }
1.4.0
GHSA-xwf4-88xr-hx2j
2022-11-03T19:12:07
2022-05-13T01:25:29
[ "CVE-2016-5394" ]
Cross site scripting in Apache Sling
In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.sling:org.apache.sling.xss" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.0.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.sling:org.apache.sling.xss.compat" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.1.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5394" }, { "type": "WEB", "url": "https://github.com/apache/sling-org-apache-sling-xss/commit/de32b144ad2be3367559f6184d560db42a220529" }, { "type": "WEB", "url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2016-5394" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/332166037a54b97cf41e2b616aaed38439de94b19b204841478e4525@%3Cdev.sling.apache.org%3E" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99870" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-11-03T19:12:07", "nvd_published_at": "2017-07-19T15:29:00" }
1.4.0
GHSA-xm2m-2q6h-22jw
2023-06-21T13:48:41
2023-06-12T18:30:18
[ "CVE-2023-34468" ]
Apache NiFi vulnerable to Code Injection
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-dbcp-base" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.22.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi-hikari-dbcp-service" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.0.2", "fixed": null }, { "introduced": null, "fixed": "1.22.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34468" }, { "type": "WEB", "url": "https://github.com/apache/nifi/pull/7349" }, { "type": "WEB", "url": "https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361" }, { "type": "PACKAGE", "url": "https://github.com/apache/nifi" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/NIFI-11653" }, { "type": "WEB", "url": "https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8" }, { "type": "WEB", "url": "https://nifi.apache.org/security.html#CVE-2023-34468" }, { "type": "WEB", "url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/06/12/3" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-06-12T20:29:34", "nvd_published_at": "2023-06-12T16:15:10" }
1.4.0
GHSA-qp5m-c3m9-8q2p
2022-08-06T05:47:04
2022-08-06T05:47:04
[ "CVE-2022-31194" ]
JSPUI vulnerable to path traversal in submission (resumable) upload
### Impact The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This path traversal can only be executed by a user with special privileges (submitter rights). This vulnerability only impacts the JSPUI. _This vulnerability does NOT impact the XMLUI or 7.x._ ### Patches _DSpace 6.x:_ * Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24 * 6.x patch file: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24.patch (may be applied manually if an immediate upgrade to 6.4 or above is not possible) _DSpace 5.x:_ * Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3 * 5.x patch file: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible) #### Apply the patch to your DSpace If at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows: 1. Download the appropriate patch file to the machine where DSpace is running 2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch` 3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps: 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code) 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder. 3. Restart Tomcat ### Workarounds There are no known workarounds. However, this vulnerability cannot be exploited by an anonymous user or a basic user. The user must first have submitter privileges to at least one Collection and be able to determine how to modify the request parameters to exploit the vulnerability. ### References Discovered & reported by Johannes Moritz of Ripstech ### For more information If you have any questions or comments about this advisory: * Email us at [email protected]
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-jspui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.0", "fixed": null }, { "introduced": null, "fixed": "5.11" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-jspui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "6.0", "fixed": null }, { "introduced": null, "fixed": "6.4" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31194" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3" }, { "type": "PACKAGE", "url": "https://github.com/DSpace/DSpace" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-08-06T05:47:04", "nvd_published_at": "2022-08-01T21:15:00" }
1.4.0
GHSA-qvq8-cw7f-m7m4
2023-06-03T00:39:55
2023-05-25T09:30:25
[ "CVE-2022-46907" ]
Apache JSPWiki vulnerable to cross-site scripting on several plugins
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-main" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.12.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-war" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.12.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46907" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/0b9a0149032170063f22d65e335dfd317db815ea" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/46e1ef7a595ca5cabf5ef184139910413f2024fc" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/484c6a133e397693991b7c9a9b62ef3ca48ce707" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/75019d337f1d0033b1f65428e75f43baeffd99dd" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/82be08904a6d8bd22fa2d4e5a7e85f43408724d3" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/9d6dbf911d52d724297e4e46c4b80649fb028ff9" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/commit/df20770f251a8d7431047e556b144ef24ee6a3a7" }, { "type": "PACKAGE", "url": "https://github.com/apache/jspwiki" }, { "type": "WEB", "url": "https://github.com/apache/jspwiki/blob/37bf55373ed5a739a388a720163cf51d1104537f/ChangeLog.md?plain=1#L112" }, { "type": "WEB", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-46907" }, { "type": "WEB", "url": "https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/05/25/1" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-05-25T17:38:08", "nvd_published_at": "2023-05-25T07:15:08" }
1.4.0
GHSA-x37v-36wv-6v6h
2023-04-20T20:55:02
2023-04-20T20:55:02
[ "CVE-2023-29528" ]
Cross-site Scripting in org.xwiki.commons:xwiki-commons-xml
### Impact The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). An example are anonymous comments in XWiki where the HTML macro filters HTML using restricted mode: ```html {{html}} <!--> <Details Open OnToggle=confirm("XSS")> {{/html}} ``` When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. Note that while all versions since 4.2-milestone-1 should be vulnerable, only starting with version 14.6-rc-1 the HTML comment is necessary for the attack to succeed due to [another vulnerability](https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m3jr-cvhj-f35j) that has been patched in version 14.6-rc-1. ### Patches This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don't start with `>`. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://jira.xwiki.org/browse/XCOMMONS-2568 * https://jira.xwiki.org/browse/XWIKI-20348 * https://github.com/xwiki/xwiki-commons/commit/8ff1a9d7e5d7b45b690134a537d53dc05cae04ab ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:[email protected]) ### Attribution This vulnerability was reported on Intigriti by [ynoof](https://twitter.com/ynoofAssiri) @Ynoof5.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.2-milestone-1", "fixed": null }, { "introduced": null, "fixed": "14.10" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-x37v-36wv-6v6h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29528" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/8ff1a9d7e5d7b45b690134a537d53dc05cae04ab" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-commons" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XCOMMONS-2568" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-20348" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-04-20T20:55:02", "nvd_published_at": "2023-04-20T18:15:07" }
1.4.0
GHSA-wh3p-fphp-9h2m
2023-08-03T17:59:29
2023-07-25T17:20:43
[ "CVE-2023-37460" ]
Arbitrary File Creation in AbstractUnArchiver
### Summary Using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. ### Description When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the resolveFile() function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later Files.newOutputStream(), that follows symlinks by default, will actually write the entry's content to the symlink's target. ### Impact Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. ### Technical Details In [AbstractUnArchiver.java](https://github.com/codehaus-plexus/plexus-archiver/blob/plexus-archiver-4.7.1/src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java#L342): ```java protected void extractFile( final File srcF, final File dir, final InputStream compressedInputStream, String entryName, final Date entryDate, final boolean isDirectory, final Integer mode, String symlinkDestination, final FileMapper[] fileMappers) throws IOException, ArchiverException { ... // Hmm. Symlinks re-evaluate back to the original file here. Unsure if this is a good thing... final File targetFileName = FileUtils.resolveFile( dir, entryName ); // Make sure that the resolved path of the extracted file doesn't escape the destination directory // getCanonicalFile().toPath() is used instead of getCanonicalPath() (returns String), // because "/opt/directory".startsWith("/opt/dir") would return false negative. Path canonicalDirPath = dir.getCanonicalFile().toPath(); Path canonicalDestPath = targetFileName.getCanonicalFile().toPath(); if ( !canonicalDestPath.startsWith( canonicalDirPath ) ) { throw new ArchiverException( "Entry is outside of the target directory (" + entryName + ")" ); } try { ... if ( !StringUtils.isEmpty( symlinkDestination ) ) { SymlinkUtils.createSymbolicLink( targetFileName, new File( symlinkDestination ) ); } else if ( isDirectory ) { targetFileName.mkdirs(); } else { try ( OutputStream out = Files.newOutputStream( targetFileName.toPath() ) ) { IOUtil.copy( compressedInputStream, out ); } } targetFileName.setLastModified( entryDate.getTime() ); if ( !isIgnorePermissions() && mode != null && !isDirectory ) { ArchiveEntryUtils.chmod( targetFileName, mode ); } } catch ( final FileNotFoundException ex ) { getLogger().warn( "Unable to expand to file " + targetFileName.getPath() ); } } ``` When given an entry that already exists in dir as a symbolic link whose target does not exist - the symbolic link’s target will be created and the content of the archive’s entry will be written to it. That’s because the way FileUtils.resolveFile() works: ```java public static File resolveFile( final File baseFile, String filename ) { ... try { file = file.getCanonicalFile(); } catch ( final IOException ioe ) { // nop } return file; } ``` File.getCanonicalFile() (tested with the most recent version of openjdk (22.2) on Unix) will eventually call [JDK_Canonicalize()](https://github.com/openjdk/jdk/blob/jdk-22%2B2/src/java.base/unix/native/libjava/canonicalize_md.c#LL48C1-L68C69): ```cpp JNIEXPORT int JDK_Canonicalize(const char *orig, char *out, int len) { if (len < PATH_MAX) { errno = EINVAL; return -1; } if (strlen(orig) > PATH_MAX) { errno = ENAMETOOLONG; return -1; } /* First try realpath() on the entire path */ if (realpath(orig, out)) { /* That worked, so return it */ collapse(out); return 0; } else { /* Something's bogus in the original path, so remove names from the end until either some subpath works or we run out of names */ ... ``` realpath() returns the destination path for a symlink, if this destination exists. But if it doesn’t - it will return NULL and we will reach the else’s clause, which will eventually return the path of the symlink itself. So in case the entry is already exists as a symbolic link to a non-existing file - file.getCanonicalFile() will return the absolute path of the symbolic link and this check will pass: ```java Path canonicalDirPath = dir.getCanonicalFile().toPath(); Path canonicalDestPath = targetFileName.getCanonicalFile().toPath(); if ( !canonicalDestPath.startsWith( canonicalDirPath ) ) { throw new ArchiverException( "Entry is outside of the target directory (" + entryName + ")" ); } ``` Later, the content of the entry will be written to the symbolic link’s destination and by doing so will create the destination file and fill it with the entry’s content. Arbitrary file creation can lead to remote code execution. For example, if there is an SSH server on the victim’s machine and ~/.ssh/authorized_keys does not exist - creating this file and filling it with an attacker's public key will allow the attacker to connect the SSH server without knowing the victim’s password. ### PoC We created a zip as following: ```bash $ ln -s /tmp/target entry1 $ echo -ne “content” > entry2 $ zip --symlinks archive.zip entry1 entry2 ``` The following command will change the name of entry2 to entry1: ```bash $ sed -i 's/entry2/entry1/' archive.zip ``` We put archive.zip in /tmp and create a dir for the extracted files: ```bash $ cp archive.zip /tmp $ mkdir /tmp/extracted_files ``` Next, we wrote a java code that opens archive.zip: ```java package com.example; import java.io.File; import org.codehaus.plexus.archiver.zip.ZipUnArchiver; public class App { public static void main( String[] args ) { ZipUnArchiver unArchiver = new ZipUnArchiver(new File("/tmp/archive.zip")); unArchiver.setDestDirectory(new File("/tmp/extracted_files")); unArchiver.extract(); } } ``` After running this java code, we can see that /tmp/target contains the string “content”: ``` $ cat /tmp/target content ``` Notice that although we used here a duplicated entry name in the same archive, this attack can be performed also by two different archives - one that contains a symlink and another archive that contains a regular file with the same entry name as the symlink.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.codehaus.plexus:plexus-archiver" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.8.0" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37460" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-archiver/commit/54759839fbdf85caf8442076f001d5fd64e0dcb2" }, { "type": "PACKAGE", "url": "https://github.com/codehaus-plexus/plexus-archiver" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-archiver/releases/tag/plexus-archiver-4.8.0" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-07-25T17:20:43", "nvd_published_at": "2023-07-25T20:15:13" }
1.4.0
GHSA-hp5r-mhgp-56c9
2021-08-04T20:00:07
2019-06-06T15:29:29
[ "CVE-2019-10078" ]
Cross-site Scriptin in JSPWiki
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-war" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-main" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10078" }, { "type": "WEB", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2019-05-29T19:05:49", "nvd_published_at": "2019-05-20T21:29:00" }
1.4.0
GHSA-cj6j-32rg-45r2
2021-08-04T19:54:08
2019-06-06T15:29:25
[ "CVE-2019-10077" ]
Cross-site Scripting in JSPWiki
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-war" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-main" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10077" }, { "type": "WEB", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2019-05-29T19:05:35", "nvd_published_at": "2019-05-20T21:29:00" }
1.4.0
GHSA-89r3-rcpj-h7w6
2023-03-06T20:46:38
2019-11-18T17:19:03
[ "CVE-2019-0207" ]
Path traversal attack on Windows platforms
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.tapestry:tapestry-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.4.0", "fixed": null }, { "introduced": null, "fixed": "5.4.5" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0207" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2019-11-18T14:18:47", "nvd_published_at": "2019-09-16T17:15:00" }
1.4.0
GHSA-77hf-23pq-2g7c
2022-11-03T22:19:38
2022-06-16T00:00:26
[ "CVE-2022-33140" ]
Code injection in Apache NiFi and NiFi Registry
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.nifi.registry:nifi-registry-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.6.0", "fixed": null }, { "introduced": null, "fixed": "1.16.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.nifi:nifi" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.10.0", "fixed": null }, { "introduced": null, "fixed": "1.16.3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33140" }, { "type": "PACKAGE", "url": "https://github.com/apache/nifi" }, { "type": "WEB", "url": "https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr" }, { "type": "WEB", "url": "https://nifi.apache.org/security.html#CVE-2022-33140" } ]
{ "cwe_ids": [ "CWE-74", "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-06-17T21:49:10", "nvd_published_at": "2022-06-15T15:15:00" }
1.4.0
GHSA-gjfx-9wx3-j6r7
2023-08-16T23:00:39
2022-05-13T01:24:34
[ "CVE-2011-4367" ]
Apache MyFaces Vulnerable to Path Traversal
Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a `..` (dot dot) in the (1) ln parameter to `faces/javax.faces.resource/web.xml` or (2) the `PATH_INFO` to `faces/javax.faces.resource/`.
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.myfaces.core:myfaces-impl" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0", "fixed": null }, { "introduced": null, "fixed": "2.0.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.myfaces.core:myfaces-impl" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduced": null, "fixed": "2.1.6" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4367" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73100" }, { "type": "WEB", "url": "https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939" }, { "type": "WEB", "url": "http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2012/Feb/150" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-11-02T00:42:02", "nvd_published_at": "2014-06-19T14:55:00" }
1.4.0
GHSA-h6p6-fc4w-cqhx
2022-07-06T21:05:00
2022-05-17T04:15:16
[ "CVE-2014-7816" ]
Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow
Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.
[]
[ { "package": { "ecosystem": "Maven", "name": "io.undertow:undertow-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0.0", "fixed": null }, { "introduced": null, "fixed": "1.0.17" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.undertow:undertow-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.1.0.Beta1", "fixed": null }, { "introduced": null, "fixed": "1.1.0.CR5" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "io.undertow:undertow-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.2.0.Beta1", "fixed": null }, { "introduced": null, "fixed": "1.2.0.Beta3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7816" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157478" }, { "type": "WEB", "url": "https://issues.jboss.org/browse/UNDERTOW-338" }, { "type": "WEB", "url": "https://issues.jboss.org/browse/WFLY-4020" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q4/830" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/71328" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-07-06T21:05:00", "nvd_published_at": "2014-12-01T15:59:00" }
1.4.0
GHSA-wc73-w5r9-x9pc
2021-10-08T22:07:01
2021-10-12T16:41:36
[ "CVE-2020-29204" ]
Cross-site Scripting in XXL-JOB
XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.xuxueli:xxl-job-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.3.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29204" }, { "type": "WEB", "url": "https://github.com/xuxueli/xxl-job/issues/2083" }, { "type": "WEB", "url": "https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e" }, { "type": "PACKAGE", "url": "https://github.com/xuxueli/xxl-job" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-10-08T22:07:01", "nvd_published_at": "2020-12-27T06:15:00" }
1.4.0
GHSA-599f-7c49-w659
2022-10-17T17:34:05
2022-10-13T19:00:17
[ "CVE-2022-42889" ]
Arbitrary code execution in Apache Commons Text
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.commons:commons-text" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.5", "fixed": null }, { "introduced": null, "fixed": "1.10.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "com.guicedee.services:commons-text" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": null } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889" }, { "type": "WEB", "url": "https://arxiv.org/pdf/2306.05534" }, { "type": "PACKAGE", "url": "https://github.com/apache/commons-text" }, { "type": "WEB", "url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202301-05" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221020-0004" }, { "type": "ADVISORY", "url": "https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Feb/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/10/18/1" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-10-13T20:22:17", "nvd_published_at": "2022-10-13T13:15:00" }
1.4.0
GHSA-cxx2-fp39-rf3r
2021-08-04T19:53:10
2019-06-06T15:29:22
[ "CVE-2019-10076" ]
Cross-Site Scripting in JSPWiki
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-war" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.jspwiki:jspwiki-main" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.9.0", "fixed": null }, { "introduced": null, "fixed": "2.11.0.M4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10076" }, { "type": "WEB", "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/05/19/4" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/108437" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2019-05-29T19:05:23", "nvd_published_at": null }
1.4.0
GHSA-m8p2-495h-ccmh
2022-02-08T22:07:14
2020-01-08T17:01:52
[ "CVE-2019-10219" ]
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.hibernate.validator:hibernate-validator" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "6.0.18" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" }, { "type": "WEB", "url": "https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee" }, { "type": "WEB", "url": "https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220210-0024" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E" }, { "type": "PACKAGE", "url": "https://github.com/hibernate/hibernate-validator" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0445" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0164" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0161" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0160" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0159" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-01-08T17:00:14", "nvd_published_at": "2019-11-08T15:15:00" }
1.4.0
GHSA-hcxq-x77q-3469
2022-06-30T15:19:51
2022-05-13T01:35:03
[ "CVE-2018-1002200" ]
Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.codehaus.plexus:plexus-archiver" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.6.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1836" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1837" }, { "type": "PACKAGE", "url": "https://github.com/codehaus-plexus/plexus-archiver" }, { "type": "WEB", "url": "https://github.com/snyk/zip-slip-vulnerability" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4227" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-06-30T15:19:51", "nvd_published_at": "2018-07-25T17:29:00" }
1.4.0
GHSA-6phf-6h5g-97j2
2023-06-02T22:05:04
2023-05-23T20:07:58
[ "CVE-2023-32697" ]
Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled
## Summary Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. ## Impacted versions : 3.6.14.1-3.41.2.1 ## References https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xerial:sqlite-jdbc" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.6.14.1", "fixed": null }, { "introduced": null, "fixed": "3.41.2.2" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32697" }, { "type": "PACKAGE", "url": "https://github.com/xerial/sqlite-jdbc" }, { "type": "WEB", "url": "https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-05-23T20:07:58", "nvd_published_at": "2023-05-23T23:15:09" }
1.4.0
GHSA-544x-2jx9-4pfg
2022-02-04T13:51:18
2022-01-28T22:25:03
[ "CVE-2022-22932" ]
Path traversal in Apache Karaf
Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.karaf:apache-karaf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.3.0", "fixed": null }, { "introduced": null, "fixed": "4.3.6" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.karaf:apache-karaf" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.2.15" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932" }, { "type": "WEB", "url": "https://github.com/apache/karaf/pull/1485" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf" }, { "type": "PACKAGE", "url": "https://github.com/apache/karaf" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/KARAF-7326" }, { "type": "WEB", "url": "https://karaf.apache.org/security/cve-2022-22932.txt" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-01-27T23:10:36", "nvd_published_at": "2022-01-26T11:15:00" }
1.4.0
GHSA-4wm8-c2vv-xrpq
2022-08-06T05:46:27
2022-08-06T05:46:27
[ "CVE-2022-31192" ]
JSPUI Possible Cross Site Scripting in "Request a Copy" Feature
### Impact The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. _This vulnerability does NOT impact the XMLUI or 7.x._ ### Patches _DSpace 6.x:_ * Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819 * 6.x patch file: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819.patch (may be applied manually if an immediate upgrade to 6.4 is not possible) _DSpace 5.x:_ * Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37 * 5.x patch file: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible) #### Apply the patch to your DSpace If at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows: 1. Download the appropriate patch file to the machine where DSpace is running 2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch` 3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps: 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code) 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder. 3. Restart Tomcat ### Workarounds As a workaround, you can temporarily disable the "Request a Copy" feature by either commenting out the below configuration (or setting its value to empty): ``` # Comment out this default value # request.item.type = all ``` Once your JSPUI site is patched, you can re-enable this setting. See https://wiki.lyrasis.org/display/DSDOC6x/Request+a+Copy for more information on this setting. ### References Discovered & reported by Andrea Bollini of 4Science ### For more information If you have any questions or comments about this advisory: * Email us at [email protected]
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-jspui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0", "fixed": null }, { "introduced": null, "fixed": "5.11" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-jspui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "6.0", "fixed": null }, { "introduced": null, "fixed": "6.4" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31192" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/commit/f7758457b7ec3489d525e39aa753cc70809d9ad9" }, { "type": "PACKAGE", "url": "https://github.com/DSpace/DSpace" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-08-06T05:46:27", "nvd_published_at": "2022-08-01T21:15:00" }
1.4.0
GHSA-vw2c-5wph-v92r
2023-12-21T22:53:21
2022-05-13T01:09:20
[ "CVE-2016-6812" ]
Improper Neutralization of Input During Web Page Generation in Apache CXF
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.0.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.cxf:cxf-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.1.0", "fixed": null }, { "introduced": null, "fixed": "3.1.9" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6812" }, { "type": "WEB", "url": "https://github.com/apache/cxf/commit/1be97cb13aef121b799b1be4d9793c0e8b925a12" }, { "type": "WEB", "url": "https://github.com/apache/cxf/commit/1f824d8039c7a42a4aa46f844e6c800e1143c7e7" }, { "type": "WEB", "url": "https://github.com/apache/cxf/commit/32e89366e2daa5670ac7a5c5c19f0bf9329a4c1e" }, { "type": "WEB", "url": "https://github.com/apache/cxf/commit/a30397b0" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0868" }, { "type": "WEB", "url": "https://github.com/apache/cxf" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/CXF-6216" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" }, { "type": "WEB", "url": "http://cxf.apache.org/security-advisories.data/CVE-2016-6812.txt.asc" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-07-06T19:46:03", "nvd_published_at": "2017-08-10T16:29:00" }
1.4.0
GHSA-6gf5-c898-7rxp
2023-05-11T20:37:30
2023-05-11T20:37:30
[ "CVE-2023-32070" ]
Improper Neutralization of Script in Attributes in XWiki (X)HTML renderers
### Impact HTML rendering didn't check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax. ### Patches This has been patched in XWiki 14.6 RC1. ### Workarounds There are no known workarounds apart from upgrading to a fixed version. ### References * https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 * https://jira.xwiki.org/browse/XRENDERING-663 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:[email protected])
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-syntax-xhtml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-core-rendering-api" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": null } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-syntax-html" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-syntax-html5" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-syntax-annotatedxhtml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.rendering:xwiki-rendering-syntax-annotatedhtml5" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-platform-annotation-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "14.6-rc-1" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32070" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-rendering" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XRENDERING-663" } ]
{ "cwe_ids": [ "CWE-79", "CWE-83" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-05-11T20:37:30", "nvd_published_at": "2023-05-10T18:15:10" }
1.4.0
GHSA-g6ph-x5wf-g337
2023-10-02T22:07:45
2023-09-25T21:30:26
[ "CVE-2022-4244" ]
plexus-codehaus vulnerable to directory traversal
A flaw was found in plexus-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with dot-dot-slash (`../`) sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.codehaus.plexus:plexus-utils" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.0.24" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4244" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-utils/issues/4" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-utils/commit/33a2853df8185b4519b1b8bfae284f03392618ef" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2023:3906" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-4244" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149841" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31521" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-09-26T17:59:40", "nvd_published_at": "2023-09-25T20:15:10" }
1.4.0
GHSA-wqfh-9m4g-7x6x
2024-03-14T21:56:27
2022-02-09T22:14:58
[ "CVE-2020-11998" ]
Remote code execution in Apache ActiveMQ
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.activemq:activemq-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.15.12", "fixed": null }, { "introduced": null, "fixed": "5.15.13" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11998" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/0d6e5f2" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/88b78d0" }, { "type": "WEB", "url": "https://github.com/apache/activemq/commit/aa8900c" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-04-05T23:02:39", "nvd_published_at": "2020-09-10T19:15:00" }
1.4.0
GHSA-fmr4-w67p-vh8x
2023-02-13T20:36:36
2018-10-19T16:55:35
[ "CVE-2018-1047" ]
Improper Input Validation in org.wildfly:wildfly-undertow
A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.wildfly:wildfly-undertow" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "12.0.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1047" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1247" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1248" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1249" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1251" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2938" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2018-1047" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528361" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-fmr4-w67p-vh8x" }, { "type": "WEB", "url": "https://issues.jboss.org/browse/WFLY-9620" } ]
{ "cwe_ids": [ "CWE-20", "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T20:49:32", "nvd_published_at": "2018-01-24T23:29:00" }
1.4.0
GHSA-4mmh-5vw7-rgvj
2022-08-18T19:07:58
2022-08-18T19:07:58
[ "CVE-2022-36007" ]
Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource`
### Impact A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ "/Users/foo/resources" ]` When passing **relative** paths to these two vulnerable functions everything is fine: `(load-resource "test.png")` => loads the file "/Users/foo/resources/test.png" `(load-resource "../resources-alt/test.png")` => rejected, outside the load path When passing **absolute** paths to these two vulnerable functions Venice may return files outside the configured load paths: `(load-resource "/Users/foo/resources/test.png")` => loads the file "/Users/foo/resources/test.png" `(load-resource "/Users/foo/resources-alt/test.png")` => loads the file "/Users/foo/resources-alt/test.png" !!! The latter call suffers from the _Partial Path Traversal_ vulnerability. This issue’s scope is limited to absolute paths whose name prefix matches a load path. E.g. for a load-path `"/Users/foo/resources"`, the actor can cause loading a resource also from `"/Users/foo/resources-alt"`, but not from `"/Users/foo/images"`. Versions of Venice before and including v1.10.16 are affected by this issue. ### Patches Upgrade to Venice >= 1.10.17, if you are on a version < 1.10.17 ### Workarounds If you cannot upgrade the library, you can control the functions that can be used in Venice with a sandbox. If it is appropriate, the functions `load-file` and `load-resource` can be blacklisted in the sandbox. ### References * [PR](https://github.com/jlangch/venice/pull/4/commits/c942c73136333bc493050910f171a48e6f575b23) ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub Venice](https://github.com/jlangch/venice) * Email us at [juerg.ch](mailto:[email protected]) ### Credits I want to publicly recognize the contribution of [Jonathan Leitschuh](https://github.com/JLLeitschuh) for reporting this issue.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.github.jlangch:venice" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.10.17" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36007" }, { "type": "WEB", "url": "https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d561ae0a" }, { "type": "WEB", "url": "https://github.com/jlangch/venice/commit/c942c73136333bc493050910f171a48e6f575b23" }, { "type": "PACKAGE", "url": "https://github.com/jlangch/venice" }, { "type": "WEB", "url": "https://github.com/jlangch/venice/releases/tag/v1.10.17" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-08-18T19:07:58", "nvd_published_at": "2022-08-15T11:21:00" }
1.4.0
GHSA-hw6x-2qwv-rxr7
2022-06-28T22:28:13
2022-05-24T16:55:58
[ "CVE-2019-10392" ]
Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin
Jenkins Git Client Plugin 2.8.4 and earlier did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:git-client" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.8.5" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10392" }, { "type": "WEB", "url": "https://github.com/jenkinsci/git-client-plugin/commit/899123fa2eb9dd2c37137aae630c47c6be6b4b02" }, { "type": "WEB", "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-06-28T22:28:13", "nvd_published_at": "2019-09-12T14:15:00" }
1.4.0
GHSA-ff2w-wm48-jhqj
2024-02-21T00:21:46
2024-02-20T12:31:00
[ "CVE-2023-51770" ]
Arbitrary File Read Vulnerability in Apache Dolphinscheduler
Arbitrary File Read Vulnerability in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dolphinscheduler:dolphinscheduler" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.2.1" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51770" }, { "type": "WEB", "url": "https://github.com/apache/dolphinscheduler/pull/15433" }, { "type": "PACKAGE", "url": "https://github.com/apache/dolphinscheduler" }, { "type": "WEB", "url": "https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g" }, { "type": "WEB", "url": "https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/20/2" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-02-21T00:21:46", "nvd_published_at": "2024-02-20T10:15:08" }
1.4.0
GHSA-76qj-9gwh-pvv3
2023-02-06T16:45:45
2023-01-26T21:30:19
[ "CVE-2023-24422" ]
Sandbox bypass in Jenkins Script Security Plugin
A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:script-security" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1229.v4880b" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24422" }, { "type": "WEB", "url": "https://github.com/jenkinsci/script-security-plugin/commit/4880bbe905a6783d80150c8b881d0127430d4a73" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/script-security-plugin" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-01-27T01:05:51", "nvd_published_at": "2023-01-26T21:18:00" }
1.4.0
GHSA-8p8g-f9vg-r7xr
2022-09-14T22:25:15
2018-12-21T17:48:19
[ "CVE-2018-1000850" ]
Directory Traversal vulnerability in Square Retrofit
Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.squareup.retrofit2:retrofit" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0", "fixed": null }, { "introduced": null, "fixed": "2.5.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" }, { "type": "WEB", "url": "https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8p8g-f9vg-r7xr" }, { "type": "PACKAGE", "url": "https://github.com/square/retrofit" }, { "type": "WEB", "url": "https://github.com/square/retrofit/blob/master/CHANGELOG.md" }, { "type": "WEB", "url": "https://ihacktoprotect.com/post/retrofit-path-traversal" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:26:16", "nvd_published_at": null }
1.4.0
GHSA-hwpc-8xqv-jvj4
2022-10-25T20:37:12
2021-03-22T23:28:38
[ "CVE-2021-21345" ]
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.4.16" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21345" }, { "type": "WEB", "url": "https://x-stream.github.io/security.html#workaround" }, { "type": "WEB", "url": "https://x-stream.github.io/CVE-2021-21345.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-5004" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210430-0002" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E" }, { "type": "PACKAGE", "url": "https://github.com/x-stream/xstream" }, { "type": "WEB", "url": "http://x-stream.github.io/changes.html#1.4.16" } ]
{ "cwe_ids": [ "CWE-78", "CWE-94" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-03-22T23:24:01", "nvd_published_at": "2021-03-23T00:15:00" }
End of preview. Expand in Data Studio

CWE-Bench-Java

This repository contains the dataset CWE-Bench-Java presented in the paper LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. At a high level, this dataset contains 120 CVEs spanning 4 CWEs, namely path-traversal, OS-command injection, cross-site scripting, and code-injection. Each CVE includes the buggy and fixed source code of the project, along with the information of the fixed files and functions. We provide the seed information for each CVE in this repository, as well as advisories.

CWE-Bench-Java Github Repository (https://github.com/iris-sast/cwe-bench-java) - The CWE-Bench-Java repository contains more details about the benchmark, and how to reproduce the benchmark for the paper. For any feedback, please open an issue.

IRIS Paper Github Repository (https://github.com/iris-sast/iris) - The IRIS repository contains instructions on reproducing the paper.

Dataset Details

The raw_data directory contains the data files from the Github repository.

The data directory contains the contents of raw_data, processed for usage with the Hugging Face datasets library. Includes Arrow-formatted files.

Project Identifier

In this dataset, each project is uniquely identified with a Project Slug, encompassing its repository name, CVE ID, and a tag corresponding to the buggy version of the project. We show one example below:

DSpace__DSpace_CVE-2016-10726_4.4
^^^^^^  ^^^^^^ ^^^^^^^^^^^^^^ ^^^
|       |      |              |--> Version Tag
|       |      |--> CVE ID
|       |--> Repository name
|--> Github Username

All the patches, advisory information, build information, and fix information are associated with project slugs. Since there are 120 projects in the CWE-Bench-Java dataset, we have 120 unique project slugs. Note that a single repository may be found to have different CVEs in different versions.

Packaged Data

- data/
  - project_info.csv
  - build_info.csv
  - fix_info.csv
- advisory/<project_slug>.json

The core set of information in this dataset lies in two files, data/project_info.csv and data/fix_info.csv. We also provide other essential information such as CVE advisory, and build information for the projects. We now go into the project information and fix information CSVs.

Advisory

vuln_id schema_version published_date modified_date aliases summary details cvss_version cvss_vector cvss_score severity_rating cwe_ids ecosystem package_name introduced_version fixed_version references github_reviewed github_reviewed_at nvd_published_at
CVE-2022-12345 1.4.0 2022-01-01 2022-01-10 GHSA-xxxx-yyyy-zzzz Example XSS vuln Reflected XSS in parameter q CVSS:3.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 6.1 MODERATE CWE-79 Maven com.example:library 1.0.0 1.0.1 https://example.com/advisory true 2022-01-05T12:00:00Z 2022-01-01T00:00:00Z

This data is extracted from the CWE-Mitre net database and converted to JSON format. We now get into each field and explain what they are.

  • vuln_id: a string like CVE-2021-44667 or GHSA-xxxx-yyyy-zzzz representing the unique ID of the vulnerability.
  • schema_version: a string indicating the schema used to encode this data (e.g., "1.4.0").
  • published_date: a date (in ISO 8601 format, e.g. 2022-03-12) representing when the vulnerability was first disclosed.
  • modified_date: a date representing when the record was last updated.
  • aliases: a list of strings (e.g., [ "CVE-2021-44667" ]) capturing alternate identifiers.
  • summary: a short string summarizing the vulnerability in one sentence.
  • details: a longer string giving a full description of how the vulnerability occurs and its impact.
  • cvss_version: a string like CVSS:3.1 indicating the version of the CVSS specification used.
  • cvss_vector: a CVSS vector string (e.g., AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) describing the severity dimensions.
  • cvss_score: a float between 0.0 and 10.0 quantifying the vulnerability severity.
  • severity_rating: a string with one of LOW, MODERATE, HIGH, or CRITICAL as a qualitative severity label.
  • cwe_ids: a list of strings like ["CWE-79"] referring to Common Weakness Enumeration identifiers.
  • ecosystem: a string such as "Maven" or "npm" indicating the software package manager ecosystem affected.
  • package_name: a string like com.alibaba.nacos:nacos-common identifying the specific package.
  • introduced_version: a string denoting the first version where the vulnerability was introduced (e.g., "0").
  • fixed_version: a string indicating the version where the issue was patched (e.g., "2.0.4").
  • references: a list of URLs pointing to advisory pages, commits, issue trackers, etc.
  • github_reviewed: a boolean (true or false) showing whether GitHub has reviewed this vulnerability.
  • github_reviewed_at: a timestamp (e.g., 2022-03-14T23:25:35Z) of when GitHub reviewed the advisory.
  • nvd_published_at: a timestamp of when the NVD officially published the vulnerability.

Project Info

id project_slug cve_id cwe_id cwe_name github_username github_repository_name github_tag github_url advisory_id buggy_commit_id fix_commit_ids
1 DSpace__DSpace_CVE-2016-10726_4.4 CVE-2016-10726 CWE-022 Path Traversal DSpace DSpace 4.4 https://github.com/DSpace/DSpace GHSA-4m9r-5gqp-7j82 ca4c86b1baa4e0b07975b1da86a34a6e7170b3b7 4239abd2dd2ae0dedd7edc95a5c9f264fdcf639d

Each row in data/project_info.csv looks like the example above. We now get into each field and explain what they are.

  • id: an integer from 1 to 120
  • project_slug: (explained in the previous section)
  • cve_id: a common vulnerability identifier CVE-XXXX-XXXXX
  • cwe_id: a common weakness enumeration (CWE) identifier. In our dataset, there is only CWE-022, CWE-078, CWE-079, CWE-094
  • cwe_name: the name of the CWE
  • github_username: the user/organization that owns the repository on Github
  • github_repository_name: the repository name on Github
  • github_tag: the tag associated with the version where the vulnerability is found; usually a version tag
  • github_url: the URL to the github repository
  • advisory_id: the advisory ID in Github Security Advisory database
  • buggy_commit_id: the commit hash (like ca4c86b1baa4e0b07975b1da86a34a6e7170b3b7) where the vulnerability can be reproduced
  • fix_commit_ids: the set of commit hashes (sequentially ordered and separated with semicolon ;) corresponding to the fix of the vulnerability

Fix Info

The data/fix_info.csv file contains the fixed Java methods and classes to each CVE. In general, the fix could span over multiple commits, and a change could be made to arbitrary files in the repository, including resources (like .txt, .html) and Java source files (including core source code and test cases). In this table, we only include the methods and classes that are considered core. Many of the rows in this table is manually vetted and labeled. Note that there may be fixes on class variables, in which case there will not be method information associated with the fix. A single function may be "fixed" by multiple commits.

Each row in data/fix_info.csv looks like the following.

project_slug cve github_username github_repository_name commit file class class_start class_end method method_start method_end signature
apache__activemq_CVE-2014-3576_5.10.2 CVE-2014-3576 apache activemq 00921f22ff9a8792d7663ef8fadd4823402a6324 activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java TransportConnection 104 1655 processControlCommand 1536 1541 Response processControlCommand(ControlCommand)
  • project_slug: the unique identifier of each project
  • cve_id: the CVE id
  • github_username: the user/organization that owns the repository on Github
  • github_repository_name: the repository name on Github
  • commit: the commit hash containing this fix
  • file: the .java file that is fixed
  • class: the name of the class that is fixed
  • class_start, class_end: the start and end line number of the class
  • method: the name of the method that is fixed
  • method_start, method_end: the start and end line number of the method
  • signature: the signature of the method. Note that we might have multiple overloaded methods with the same name but with different signatures

Dataset Sources

An extension of this dataset can be found on the Github repository, which provides utilities to fetch and build the relevant projects, and a simple website visualizer.

  • Curated by: Ziyang Li, Saikat Dutta
  • License: MIT

Uses

  • Study patterns from previous vulnerability fixes to address current vulnerabilities effectively.
  • Evaluate and compare performance of static analysis tools (e.g., CodeQL, Semgrep) on real-world vulnerabilities.
  • Assess and measure accuracy, recall, precision, and false-positive rates of various security tools across different vulnerability types.
  • Use detailed fix information to improve automatic patch generation and vulnerability remediation systems.
  • Provide examples of code vulnerabilities and their respective fixes to educate developers, cybersecurity professionals, and students.

Direct Use Examples

  • Analyzing past Java-based CVE fixes on CWE-022 classifications to develop guidelines for addressing file-access vulnerabilities
  • Conducting controlled experiments to systematically quantify false positives and true positive detections of security tools for injection
  • Developing interactive security training modules that showcase vulnerabilities alongside detailed explanations of the actual patches

Out-of-Scope Use

  • Because the dataset covers only specific vulnerability types and limited CVEs, it should not be treated as a complete security benchmark for evaluating the entire security posture of software projects.
  • Sole reliance on the provided CVE data without additional context or tooling may lead to misinterpretations on what the vulnerability actually is.
  • Tools unrelated to static analysis or vulnerability patching (e.g., antivirus software) would likely see limited benefit from this dataset.

Misuse and Malicious Use

  • Attackers could analyze vulnerable code examples to understand how to exploit similar software weaknesses
  • Detailed information about vulnerabilities might aid in crafting targeted attacks against unpatched software versions.

Curation Rationale

The dataset was created to provide a high-quality benchmark for evaluating the ability of IRIS to detect and fix real-world vulnerabilities in Java code. Existing benchmarks often lack direct links to real CVEs and actionable fixes. This dataset bridges that gap with reproducible, well-labeled examples tied to CVEs and CWEs.

Source Data

  • GitHub Security Advisories (https://github.com/advisories): Used to extract structured CVE metadata, severity ratings, affected packages, ecosystem information.
  • Github commits: Commit logs and diffs were used to identify the buggy and fixed versions of code and determine class/method-level changes needed to fix the vulnerability.
  • MITRE CWE Database (https://cwe.mitre.org): Provided the classification, naming, description, and available links related to each vulnerability type.

Data Collection and Processing

  • Projects were selected based on the availability of Java source code and documentation on how to fix the error
  • Buggy and fixed code versions using git diff and commit history
  • Associated advisory information from GitHub Security Advisories and NVD
  • Class and method boundaries using AST analysis
  • Patch validation was performed via manual review and automated testing where possible.

Bias, Risks, and Limitations

  • Biased toward Java: Only Java-based CVEs are included; generalization to other languages (e.g., C/C++, Python) should be done with caution.
  • Limited in CWE scope: Covers only 4 CWEs — CWE-022, CWE-078, CWE-079, CWE-094.
  • Biased toward open-source: Enterprise and closed-source vulnerabilities are excluded, limiting the scope of evaluation.
  • Manually vetted, which introduces potential human error or subjective judgment in what counts as the “core fix.”

Citation

Consider citing our paper:

@article{li2024iris,
      title={LLM-Assisted Static Analysis for Detecting Security Vulnerabilities},
      author={Ziyang Li and Saikat Dutta and Mayur Naik},
      year={2024},
      eprint={2405.17238},
      archivePrefix={arXiv},
      primaryClass={cs.CR},
      url={https://arxiv.org/abs/2405.17238},
}

Glossary

  • CVE (Common Vulnerabilities and Exposures): A unique identifier for a known security vulnerability.
  • CWE (Common Weakness Enumeration): A formalized taxonomy of software vulnerability types.
  • CVSS (Common Vulnerability Scoring System): A standard for assessing the severity of security vulnerabilities.
  • Static Analysis: Code analysis technique that examines source code without executing it.
  • Patch: A set of changes to a program designed to fix a known issue or vulnerability

Dataset Card Authors

  • Ziyang Li (University of Pennsylvania)
  • Saikat Dutta (Cornell University)
  • Mayur Naik (University of Pennsylvania)
  • Claire Wang (University of Pennsylvania)
  • Kevin Xue (University of Pennsylvania)
  • Amartya Das

Dataset Card Contact

For any feedback, questions, concerns - please open an issue on the CWE-Bench-Java Github repository.

Downloads last month
75