add advisory .json files
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- advisory/DSpace__DSpace_CVE-2016-10726_4.4.json +107 -0
- advisory/DSpace__DSpace_CVE-2022-31192_5.10.json +88 -0
- advisory/DSpace__DSpace_CVE-2022-31194_5.10.json +88 -0
- advisory/DSpace__DSpace_CVE-2022-31195_5.10.json +88 -0
- advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json +88 -0
- advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json +80 -0
- advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json +69 -0
- advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json +57 -0
- advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json +130 -0
- advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json +65 -0
- advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json +78 -0
- advisory/apache__activemq_CVE-2014-3576_5.10.2.json +93 -0
- advisory/apache__activemq_CVE-2019-0222_5.15.8.json +141 -0
- advisory/apache__activemq_CVE-2020-11998_5.15.12.json +96 -0
- advisory/apache__camel_CVE-2018-8041_2.20.3.json +142 -0
- advisory/apache__camel_CVE-2019-0194_2.21.4.json +129 -0
- advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json +69 -0
- advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json +61 -0
- advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json +70 -0
- advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json +70 -0
- advisory/apache__dubbo_CVE-2021-30180_2.7.9.json +58 -0
- advisory/apache__flink_CVE-2020-17519_1.11.2.json +138 -0
- advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json +76 -0
- advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json +92 -0
- advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json +94 -0
- advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json +82 -0
- advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json +82 -0
- advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json +60 -0
- advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json +120 -0
- advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json +120 -0
- advisory/apache__myfaces_CVE-2011-4367_2.0.11.json +85 -0
- advisory/apache__nifi_CVE-2022-33140_1.16.2.json +85 -0
- advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json +70 -0
- advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json +134 -0
- advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json +84 -0
- advisory/apache__shiro_CVE-2023-34478_1.11.0.json +92 -0
- advisory/apache__shiro_CVE-2023-46749_1.12.0.json +79 -0
- advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json +69 -0
- advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json +88 -0
- advisory/apache__struts_CVE-2020-17530_2.5.25.json +98 -0
- advisory/apache__tika_CVE-2018-11762_1.18.json +65 -0
- advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json +61 -0
- advisory/asf__commons-io_CVE-2021-29425_2.6.json +391 -0
- advisory/asf__commons-text_CVE-2022-42889_1.9.json +120 -0
- advisory/asf__cxf_CVE-2016-6812_3.0.11.json +134 -0
- advisory/asf__cxf_CVE-2019-17573_3.2.11.json +170 -0
- advisory/asf__james-project_CVE-2022-22931_3.6.0.json +70 -0
- advisory/asf__karaf_CVE-2022-22932_4.3.5.json +96 -0
- advisory/asf__nifi_CVE-2023-34468_1.21.0.json +108 -0
- advisory/asf__nifi_CVE-2023-36542_1.22.0.json +214 -0
advisory/DSpace__DSpace_CVE-2016-10726_4.4.json
ADDED
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-4m9r-5gqp-7j82",
|
4 |
+
"modified": "2021-06-11T14:37:55Z",
|
5 |
+
"published": "2018-10-19T16:52:06Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2016-10726"
|
8 |
+
],
|
9 |
+
"summary": "High severity vulnerability that affects org.dspace:dspace-xmlui",
|
10 |
+
"details": "The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.dspace:dspace-xmlui"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "4.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "4.5"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.dspace:dspace-xmlui"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "5.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "5.5"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.dspace:dspace-xmlui"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "3.6"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
}
|
75 |
+
],
|
76 |
+
"references": [
|
77 |
+
{
|
78 |
+
"type": "ADVISORY",
|
79 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726"
|
80 |
+
},
|
81 |
+
{
|
82 |
+
"type": "WEB",
|
83 |
+
"url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5"
|
84 |
+
},
|
85 |
+
{
|
86 |
+
"type": "ADVISORY",
|
87 |
+
"url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82"
|
88 |
+
},
|
89 |
+
{
|
90 |
+
"type": "WEB",
|
91 |
+
"url": "https://jira.duraspace.org/browse/DS-3094"
|
92 |
+
},
|
93 |
+
{
|
94 |
+
"type": "WEB",
|
95 |
+
"url": "https://wiki.duraspace.org/display/DSDOC5x/Release+Notes"
|
96 |
+
}
|
97 |
+
],
|
98 |
+
"database_specific": {
|
99 |
+
"cwe_ids": [
|
100 |
+
"CWE-22"
|
101 |
+
],
|
102 |
+
"severity": "HIGH",
|
103 |
+
"github_reviewed": true,
|
104 |
+
"github_reviewed_at": "2020-06-16T20:58:34Z",
|
105 |
+
"nvd_published_at": null
|
106 |
+
}
|
107 |
+
}
|
advisory/DSpace__DSpace_CVE-2022-31192_5.10.json
ADDED
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-4wm8-c2vv-xrpq",
|
4 |
+
"modified": "2022-08-06T05:46:27Z",
|
5 |
+
"published": "2022-08-06T05:46:27Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-31192"
|
8 |
+
],
|
9 |
+
"summary": "JSPUI Possible Cross Site Scripting in \"Request a Copy\" Feature",
|
10 |
+
"details": "### Impact\nThe JSPUI \"Request a Copy\" feature does not properly escape values submitted and stored from the \"Request a Copy\" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI.\n\n_This vulnerability does NOT impact the XMLUI or 7.x._\n\n### Patches\n\n_DSpace 6.x:_ \n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819.patch (may be applied manually if an immediate upgrade to 6.4 is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\nAs a workaround, you can temporarily disable the \"Request a Copy\" feature by either commenting out the below configuration (or setting its value to empty):\n```\n# Comment out this default value\n# request.item.type = all\n```\nOnce your JSPUI site is patched, you can re-enable this setting. See https://wiki.lyrasis.org/display/DSDOC6x/Request+a+Copy for more information on this setting.\n\n### References\nDiscovered & reported by Andrea Bollini of 4Science\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [email protected]\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.dspace:dspace-jspui"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "5.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.11"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.dspace:dspace-jspui"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "6.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "6.4"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "ADVISORY",
|
64 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31192"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://github.com/DSpace/DSpace/commit/f7758457b7ec3489d525e39aa753cc70809d9ad9"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "PACKAGE",
|
76 |
+
"url": "https://github.com/DSpace/DSpace"
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"database_specific": {
|
80 |
+
"cwe_ids": [
|
81 |
+
"CWE-79"
|
82 |
+
],
|
83 |
+
"severity": "HIGH",
|
84 |
+
"github_reviewed": true,
|
85 |
+
"github_reviewed_at": "2022-08-06T05:46:27Z",
|
86 |
+
"nvd_published_at": "2022-08-01T21:15:00Z"
|
87 |
+
}
|
88 |
+
}
|
advisory/DSpace__DSpace_CVE-2022-31194_5.10.json
ADDED
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-qp5m-c3m9-8q2p",
|
4 |
+
"modified": "2022-08-06T05:47:04Z",
|
5 |
+
"published": "2022-08-06T05:47:04Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-31194"
|
8 |
+
],
|
9 |
+
"summary": "JSPUI vulnerable to path traversal in submission (resumable) upload",
|
10 |
+
"details": "### Impact\nThe JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This path traversal can only be executed by a user with special privileges (submitter rights). This vulnerability only impacts the JSPUI.\n\n_This vulnerability does NOT impact the XMLUI or 7.x._\n\n### Patches\n\n_DSpace 6.x:_\n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24.patch (may be applied manually if an immediate upgrade to 6.4 or above is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\n\nThere are no known workarounds. However, this vulnerability cannot be exploited by an anonymous user or a basic user. The user must first have submitter privileges to at least one Collection and be able to determine how to modify the request parameters to exploit the vulnerability.\n\n### References\nDiscovered & reported by Johannes Moritz of Ripstech\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [email protected]\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.dspace:dspace-jspui"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "4.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.11"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.dspace:dspace-jspui"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "6.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "6.4"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "ADVISORY",
|
64 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31194"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "PACKAGE",
|
76 |
+
"url": "https://github.com/DSpace/DSpace"
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"database_specific": {
|
80 |
+
"cwe_ids": [
|
81 |
+
"CWE-22"
|
82 |
+
],
|
83 |
+
"severity": "HIGH",
|
84 |
+
"github_reviewed": true,
|
85 |
+
"github_reviewed_at": "2022-08-06T05:47:04Z",
|
86 |
+
"nvd_published_at": "2022-08-01T21:15:00Z"
|
87 |
+
}
|
88 |
+
}
|
advisory/DSpace__DSpace_CVE-2022-31195_5.10.json
ADDED
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-8rmh-55h4-93h5",
|
4 |
+
"modified": "2022-08-11T17:03:11Z",
|
5 |
+
"published": "2022-08-06T05:48:56Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-31195"
|
8 |
+
],
|
9 |
+
"summary": "DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import",
|
10 |
+
"details": "### Impact\nItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line.\n\n_This vulnerability does NOT impact 7.x._\n\n### Patches\n\n_DSpace 6.x:_ \n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0.patch (may be applied manually if an immediate upgrade to 6.4 or 7.x is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 or 7.x is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\n\nAs a basic workaround, you may block all access to the following URL paths:\n* If you are using the XMLUI, block all access to `/admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path \"/xmlui\", then you'd need to block access to `/xmlui/admin/batchimport`.\n* If you are using the JSPUI, block all access to `/dspace-admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path \"/jspui\", then you'd need to block access to `/jspui/dspace-admin/batchimport`.\n\nKeep in mind, only an Administrative user or a user with command-line access to the server is able to import/upload SAF packages. Therefore, assuming those users do not blindly upload untrusted SAF packages, then it is unlikely your site could be impacted by this vulnerability.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [email protected]\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.dspace:dspace-api"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "4.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.11"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.dspace:dspace-api"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "6.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "6.4"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-8rmh-55h4-93h5"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "ADVISORY",
|
64 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31195"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "PACKAGE",
|
76 |
+
"url": "https://github.com/DSpace/DSpace"
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"database_specific": {
|
80 |
+
"cwe_ids": [
|
81 |
+
"CWE-22"
|
82 |
+
],
|
83 |
+
"severity": "HIGH",
|
84 |
+
"github_reviewed": true,
|
85 |
+
"github_reviewed_at": "2022-08-06T05:48:56Z",
|
86 |
+
"nvd_published_at": "2022-08-01T21:15:00Z"
|
87 |
+
}
|
88 |
+
}
|
advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json
ADDED
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-8m5h-hrqm-pxm2",
|
4 |
+
"modified": "2022-04-27T21:09:43Z",
|
5 |
+
"published": "2022-04-27T21:09:43Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-23457"
|
8 |
+
],
|
9 |
+
"summary": "Path traversal in the OWASP Enterprise Security API",
|
10 |
+
"details": "### Impact\nThe default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.\n\n### Patches\nThis vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.\n\n### Workarounds\nYes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.owasp.esapi:esapi"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.3.0.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.2.3.1"
|
38 |
+
}
|
39 |
+
}
|
40 |
+
],
|
41 |
+
"references": [
|
42 |
+
{
|
43 |
+
"type": "WEB",
|
44 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"type": "ADVISORY",
|
48 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23457"
|
49 |
+
},
|
50 |
+
{
|
51 |
+
"type": "WEB",
|
52 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a"
|
53 |
+
},
|
54 |
+
{
|
55 |
+
"type": "PACKAGE",
|
56 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy"
|
57 |
+
},
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://security.netapp.com/advisory/ntap-20230127-0014"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "ADVISORY",
|
72 |
+
"url": "https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"database_specific": {
|
80 |
+
"cwe_ids": [
|
81 |
+
"CWE-22"
|
82 |
+
],
|
83 |
+
"severity": "HIGH",
|
84 |
+
"github_reviewed": true,
|
85 |
+
"github_reviewed_at": "2022-04-27T21:09:43Z",
|
86 |
+
"nvd_published_at": "2022-04-25T20:15:00Z"
|
87 |
+
}
|
88 |
+
}
|
advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json
ADDED
@@ -0,0 +1,80 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-q77q-vx4q-xx6q",
|
4 |
+
"modified": "2022-05-10T15:44:45Z",
|
5 |
+
"published": "2022-04-27T21:09:46Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-24891"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site Scripting in org.owasp.esapi:esapi",
|
10 |
+
"details": "### Impact\nThere is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for \"onsiteURL\" in the **antisamy-esapi.xml** configuration file that can cause URLs with the \"javascript:\" scheme to NOT be sanitized. See the reference below for full details.\n\n### Patches\nPatched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.\n\n### Workarounds\nManually edit your **antisamy-esapi.xml** configuration files to change the \"onsiteURL\" regular expression as per remediation instructions in the reference below.\n\n### References\n[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.owasp.esapi:esapi"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.3.0.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.2.3.1"
|
38 |
+
}
|
39 |
+
}
|
40 |
+
],
|
41 |
+
"references": [
|
42 |
+
{
|
43 |
+
"type": "WEB",
|
44 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"type": "ADVISORY",
|
48 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24891"
|
49 |
+
},
|
50 |
+
{
|
51 |
+
"type": "PACKAGE",
|
52 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy"
|
53 |
+
},
|
54 |
+
{
|
55 |
+
"type": "WEB",
|
56 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf"
|
57 |
+
},
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://security.netapp.com/advisory/ntap-20230127-0014"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
69 |
+
}
|
70 |
+
],
|
71 |
+
"database_specific": {
|
72 |
+
"cwe_ids": [
|
73 |
+
"CWE-79"
|
74 |
+
],
|
75 |
+
"severity": "MODERATE",
|
76 |
+
"github_reviewed": true,
|
77 |
+
"github_reviewed_at": "2022-04-27T21:09:46Z",
|
78 |
+
"nvd_published_at": "2022-04-27T21:15:00Z"
|
79 |
+
}
|
80 |
+
}
|
advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json
ADDED
@@ -0,0 +1,69 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-2q4p-f6gf-mqr5",
|
4 |
+
"modified": "2023-08-31T18:52:56Z",
|
5 |
+
"published": "2023-07-06T20:53:15Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-41044"
|
8 |
+
],
|
9 |
+
"summary": "Graylog server has partial path traversal vulnerability in Support Bundle feature",
|
10 |
+
"details": "A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.\n\nThanks to weiweiwei9811 for reporting this vulnerability and providing detailed information.\n\n### Impact\n\nGraylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory.\n\nThe default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`.\n\nDue to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name.\n\nThe vulnerability would allow the download or deletion of files in the following example directories.\n\n- `/var/lib/graylog-server/support-bundle-test`\n- `/var/lib/graylog-server/support-bundlesdirectory`\n\nFor the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default.\n\n### Patches\n\nThe vulnerability is fixed in Graylog version 5.1.3 and later.\n\n### Workarounds\n\n\nBlock all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog.\n\n- `GET /api/system/debug/support/bundle/download/{filename}`\n- `DELETE /api/system/debug/support/bundle/{filename}`\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.graylog2:graylog2-server"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "5.1.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.1.3"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "WEB",
|
41 |
+
"url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "ADVISORY",
|
45 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "PACKAGE",
|
53 |
+
"url": "https://github.com/Graylog2/graylog2-server"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm"
|
58 |
+
}
|
59 |
+
],
|
60 |
+
"database_specific": {
|
61 |
+
"cwe_ids": [
|
62 |
+
"CWE-22"
|
63 |
+
],
|
64 |
+
"severity": "LOW",
|
65 |
+
"github_reviewed": true,
|
66 |
+
"github_reviewed_at": "2023-07-06T20:53:15Z",
|
67 |
+
"nvd_published_at": "2023-08-31T18:15:09Z"
|
68 |
+
}
|
69 |
+
}
|
advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json
ADDED
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-g8jj-899q-8x3j",
|
4 |
+
"modified": "2021-05-13T19:52:04Z",
|
5 |
+
"published": "2022-02-10T23:04:13Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2020-13973"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site scripting in json-sanitizer",
|
10 |
+
"details": "OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "com.mikesamuel:json-sanitizer"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.2.1"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/OWASP/json-sanitizer/pull/20"
|
46 |
+
}
|
47 |
+
],
|
48 |
+
"database_specific": {
|
49 |
+
"cwe_ids": [
|
50 |
+
"CWE-79"
|
51 |
+
],
|
52 |
+
"severity": "MODERATE",
|
53 |
+
"github_reviewed": true,
|
54 |
+
"github_reviewed_at": "2021-05-13T19:52:04Z",
|
55 |
+
"nvd_published_at": "2020-06-09T04:15:00Z"
|
56 |
+
}
|
57 |
+
}
|
advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json
ADDED
@@ -0,0 +1,130 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-rrpm-pj7p-7j9q",
|
4 |
+
"modified": "2022-09-14T01:00:57Z",
|
5 |
+
"published": "2018-10-18T18:05:34Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2018-1260"
|
8 |
+
],
|
9 |
+
"summary": "Spring Security OAuth vulnerable to remote code execution (RCE)",
|
10 |
+
"details": "Spring Security OAuth versions prior to 2.3.3,prior to 2.2.2, prior to 2.1.2, and prior to 2.0.15 contain a remote code execution vulnerability. An attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint. ",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.springframework.security.oauth:spring-security-oauth2"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.3.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.3.3"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.springframework.security.oauth:spring-security-oauth2"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "2.2.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.2.2"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.springframework.security.oauth:spring-security-oauth2"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "2.1.0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "2.1.2"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"package": {
|
77 |
+
"ecosystem": "Maven",
|
78 |
+
"name": "org.springframework.security.oauth:spring-security-oauth2"
|
79 |
+
},
|
80 |
+
"ranges": [
|
81 |
+
{
|
82 |
+
"type": "ECOSYSTEM",
|
83 |
+
"events": [
|
84 |
+
{
|
85 |
+
"introduced": "2.0.0"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"fixed": "2.0.15"
|
89 |
+
}
|
90 |
+
]
|
91 |
+
}
|
92 |
+
]
|
93 |
+
}
|
94 |
+
],
|
95 |
+
"references": [
|
96 |
+
{
|
97 |
+
"type": "ADVISORY",
|
98 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1260"
|
99 |
+
},
|
100 |
+
{
|
101 |
+
"type": "WEB",
|
102 |
+
"url": "https://access.redhat.com/errata/RHSA-2018:1809"
|
103 |
+
},
|
104 |
+
{
|
105 |
+
"type": "WEB",
|
106 |
+
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
|
107 |
+
},
|
108 |
+
{
|
109 |
+
"type": "ADVISORY",
|
110 |
+
"url": "https://github.com/advisories/GHSA-rrpm-pj7p-7j9q"
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"type": "WEB",
|
114 |
+
"url": "https://pivotal.io/security/cve-2018-1260"
|
115 |
+
},
|
116 |
+
{
|
117 |
+
"type": "WEB",
|
118 |
+
"url": "http://www.securityfocus.com/bid/104158"
|
119 |
+
}
|
120 |
+
],
|
121 |
+
"database_specific": {
|
122 |
+
"cwe_ids": [
|
123 |
+
"CWE-94"
|
124 |
+
],
|
125 |
+
"severity": "CRITICAL",
|
126 |
+
"github_reviewed": true,
|
127 |
+
"github_reviewed_at": "2020-06-16T21:55:47Z",
|
128 |
+
"nvd_published_at": null
|
129 |
+
}
|
130 |
+
}
|
advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json
ADDED
@@ -0,0 +1,65 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-4gr7-qw2q-jxh6",
|
4 |
+
"modified": "2022-03-22T21:37:08Z",
|
5 |
+
"published": "2022-03-12T00:00:27Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2021-44667"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site Scripting in Nacos",
|
10 |
+
"details": "A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "com.alibaba.nacos:nacos-common"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.0.4"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44667"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/alibaba/nacos/issues/7359"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "PACKAGE",
|
53 |
+
"url": "https://github.com/alibaba/nacos"
|
54 |
+
}
|
55 |
+
],
|
56 |
+
"database_specific": {
|
57 |
+
"cwe_ids": [
|
58 |
+
"CWE-79"
|
59 |
+
],
|
60 |
+
"severity": "MODERATE",
|
61 |
+
"github_reviewed": true,
|
62 |
+
"github_reviewed_at": "2022-03-14T23:25:35Z",
|
63 |
+
"nvd_published_at": "2022-03-11T19:15:00Z"
|
64 |
+
}
|
65 |
+
}
|
advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json
ADDED
@@ -0,0 +1,78 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-9hr3-j9mc-xmq2",
|
4 |
+
"modified": "2022-05-20T21:17:03Z",
|
5 |
+
"published": "2022-05-03T00:00:44Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-25842"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal in com.alibaba.oneagent:one-java-agent-plugin",
|
10 |
+
"details": "All versions of package `com.alibaba.oneagent:one-java-agent-plugin` are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. `../../evil.exe`). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:L"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "com.alibaba.oneagent:one-java-agent-plugin"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "0.0.2"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25842"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/alibaba/one-java-agent/pull/29"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "https://github.com/alibaba/one-java-agent/pull/29/commits/b5b437f9f4c8cbfe7bdbe266e975a4bd513c13fe"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "PACKAGE",
|
57 |
+
"url": "https://github.com/alibaba/one-java-agent"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874"
|
66 |
+
}
|
67 |
+
],
|
68 |
+
"database_specific": {
|
69 |
+
"cwe_ids": [
|
70 |
+
"CWE-22",
|
71 |
+
"CWE-29"
|
72 |
+
],
|
73 |
+
"severity": "MODERATE",
|
74 |
+
"github_reviewed": true,
|
75 |
+
"github_reviewed_at": "2022-05-20T21:17:03Z",
|
76 |
+
"nvd_published_at": "2022-05-01T16:15:00Z"
|
77 |
+
}
|
78 |
+
}
|
advisory/apache__activemq_CVE-2014-3576_5.10.2.json
ADDED
@@ -0,0 +1,93 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-3wfj-vh84-732p",
|
4 |
+
"modified": "2023-12-20T19:05:58Z",
|
5 |
+
"published": "2022-05-14T01:14:52Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2014-3576"
|
8 |
+
],
|
9 |
+
"summary": "Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ",
|
10 |
+
"details": "The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.activemq:activemq-client"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.11.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3576"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/apache/activemq/commit/00921f22ff9a8792d7663ef8fadd4823402a6324"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/apache/activemq/commit/f07e6a53216f9388185ac2b39f366f3bfd6a8a55"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "PACKAGE",
|
53 |
+
"url": "https://github.com/apache/activemq"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "http://activemq.2283324.n4.nabble.com/About-CVE-2014-3576-tp4699628.html"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html"
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"type": "WEB",
|
69 |
+
"url": "http://www.debian.org/security/2015/dsa-3330"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"type": "WEB",
|
73 |
+
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"type": "WEB",
|
77 |
+
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
78 |
+
},
|
79 |
+
{
|
80 |
+
"type": "WEB",
|
81 |
+
"url": "http://www.securityfocus.com/archive/1/536862/100/0/threaded"
|
82 |
+
}
|
83 |
+
],
|
84 |
+
"database_specific": {
|
85 |
+
"cwe_ids": [
|
86 |
+
"CWE-78"
|
87 |
+
],
|
88 |
+
"severity": "HIGH",
|
89 |
+
"github_reviewed": true,
|
90 |
+
"github_reviewed_at": "2022-07-07T22:40:47Z",
|
91 |
+
"nvd_published_at": "2015-08-14T18:59:00Z"
|
92 |
+
}
|
93 |
+
}
|
advisory/apache__activemq_CVE-2019-0222_5.15.8.json
ADDED
@@ -0,0 +1,141 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-jpv3-g4cc-6vfx",
|
4 |
+
"modified": "2024-03-14T22:09:43Z",
|
5 |
+
"published": "2019-04-02T15:46:42Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-0222"
|
8 |
+
],
|
9 |
+
"summary": "Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client",
|
10 |
+
"details": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.activemq:activemq-client"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "5.0.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.15.9"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/apache/activemq/commit/98b9f2e"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/apache/activemq/commit/f78c0962ffb46fae3397eed6b7ec1e6e15045031"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "https://web.archive.org/web/20190404065432/http://www.securityfocus.com/bid/107622"
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"type": "WEB",
|
69 |
+
"url": "https://security.netapp.com/advisory/ntap-20190502-0006"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"type": "WEB",
|
73 |
+
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html"
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"type": "WEB",
|
77 |
+
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html"
|
78 |
+
},
|
79 |
+
{
|
80 |
+
"type": "WEB",
|
81 |
+
"url": "https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E"
|
82 |
+
},
|
83 |
+
{
|
84 |
+
"type": "WEB",
|
85 |
+
"url": "https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"type": "WEB",
|
89 |
+
"url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E"
|
90 |
+
},
|
91 |
+
{
|
92 |
+
"type": "WEB",
|
93 |
+
"url": "https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E"
|
94 |
+
},
|
95 |
+
{
|
96 |
+
"type": "WEB",
|
97 |
+
"url": "https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E"
|
98 |
+
},
|
99 |
+
{
|
100 |
+
"type": "WEB",
|
101 |
+
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
|
102 |
+
},
|
103 |
+
{
|
104 |
+
"type": "WEB",
|
105 |
+
"url": "https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E"
|
106 |
+
},
|
107 |
+
{
|
108 |
+
"type": "WEB",
|
109 |
+
"url": "https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E"
|
110 |
+
},
|
111 |
+
{
|
112 |
+
"type": "WEB",
|
113 |
+
"url": "https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E"
|
114 |
+
},
|
115 |
+
{
|
116 |
+
"type": "WEB",
|
117 |
+
"url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
|
118 |
+
},
|
119 |
+
{
|
120 |
+
"type": "PACKAGE",
|
121 |
+
"url": "https://github.com/apache/activemq"
|
122 |
+
},
|
123 |
+
{
|
124 |
+
"type": "WEB",
|
125 |
+
"url": "http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt"
|
126 |
+
},
|
127 |
+
{
|
128 |
+
"type": "WEB",
|
129 |
+
"url": "http://www.openwall.com/lists/oss-security/2019/03/27/2"
|
130 |
+
}
|
131 |
+
],
|
132 |
+
"database_specific": {
|
133 |
+
"cwe_ids": [
|
134 |
+
"CWE-94"
|
135 |
+
],
|
136 |
+
"severity": "HIGH",
|
137 |
+
"github_reviewed": true,
|
138 |
+
"github_reviewed_at": "2020-06-16T21:44:05Z",
|
139 |
+
"nvd_published_at": "2019-03-28T22:29:00Z"
|
140 |
+
}
|
141 |
+
}
|
advisory/apache__activemq_CVE-2020-11998_5.15.12.json
ADDED
@@ -0,0 +1,96 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-wqfh-9m4g-7x6x",
|
4 |
+
"modified": "2024-03-14T21:56:27Z",
|
5 |
+
"published": "2022-02-09T22:14:58Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2020-11998"
|
8 |
+
],
|
9 |
+
"summary": "Remote code execution in Apache ActiveMQ",
|
10 |
+
"details": "A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.activemq:activemq-parent"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "5.15.12"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.15.13"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"versions": [
|
37 |
+
"5.15.12"
|
38 |
+
]
|
39 |
+
}
|
40 |
+
],
|
41 |
+
"references": [
|
42 |
+
{
|
43 |
+
"type": "ADVISORY",
|
44 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11998"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"type": "WEB",
|
48 |
+
"url": "https://github.com/apache/activemq/commit/0d6e5f2"
|
49 |
+
},
|
50 |
+
{
|
51 |
+
"type": "WEB",
|
52 |
+
"url": "https://github.com/apache/activemq/commit/88b78d0"
|
53 |
+
},
|
54 |
+
{
|
55 |
+
"type": "WEB",
|
56 |
+
"url": "https://github.com/apache/activemq/commit/aa8900c"
|
57 |
+
},
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
81 |
+
},
|
82 |
+
{
|
83 |
+
"type": "WEB",
|
84 |
+
"url": "http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt"
|
85 |
+
}
|
86 |
+
],
|
87 |
+
"database_specific": {
|
88 |
+
"cwe_ids": [
|
89 |
+
"CWE-94"
|
90 |
+
],
|
91 |
+
"severity": "CRITICAL",
|
92 |
+
"github_reviewed": true,
|
93 |
+
"github_reviewed_at": "2021-04-05T23:02:39Z",
|
94 |
+
"nvd_published_at": "2020-09-10T19:15:00Z"
|
95 |
+
}
|
96 |
+
}
|
advisory/apache__camel_CVE-2018-8041_2.20.3.json
ADDED
@@ -0,0 +1,142 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-jv74-f9pj-xp3f",
|
4 |
+
"modified": "2022-11-17T19:14:08Z",
|
5 |
+
"published": "2018-10-16T23:07:57Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2018-8041"
|
8 |
+
],
|
9 |
+
"summary": "Apache Camel's Mail is vulnerable to path traversal",
|
10 |
+
"details": "Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.camel:camel-mail"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.20.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.20.4"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.camel:camel-mail"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "2.21.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.21.2"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.apache.camel:camel-mail"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "2.22.0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "2.22.1"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
],
|
74 |
+
"versions": [
|
75 |
+
"2.22.0"
|
76 |
+
]
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"references": [
|
80 |
+
{
|
81 |
+
"type": "ADVISORY",
|
82 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8041"
|
83 |
+
},
|
84 |
+
{
|
85 |
+
"type": "WEB",
|
86 |
+
"url": "https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc"
|
87 |
+
},
|
88 |
+
{
|
89 |
+
"type": "WEB",
|
90 |
+
"url": "https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3"
|
91 |
+
},
|
92 |
+
{
|
93 |
+
"type": "WEB",
|
94 |
+
"url": "https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4"
|
95 |
+
},
|
96 |
+
{
|
97 |
+
"type": "WEB",
|
98 |
+
"url": "https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7"
|
99 |
+
},
|
100 |
+
{
|
101 |
+
"type": "WEB",
|
102 |
+
"url": "https://access.redhat.com/errata/RHSA-2018:3768"
|
103 |
+
},
|
104 |
+
{
|
105 |
+
"type": "ADVISORY",
|
106 |
+
"url": "https://github.com/advisories/GHSA-jv74-f9pj-xp3f"
|
107 |
+
},
|
108 |
+
{
|
109 |
+
"type": "PACKAGE",
|
110 |
+
"url": "https://github.com/apache/camel"
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"type": "WEB",
|
114 |
+
"url": "https://issues.apache.org/jira/browse/CAMEL-12630"
|
115 |
+
},
|
116 |
+
{
|
117 |
+
"type": "WEB",
|
118 |
+
"url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"
|
119 |
+
},
|
120 |
+
{
|
121 |
+
"type": "WEB",
|
122 |
+
"url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"
|
123 |
+
},
|
124 |
+
{
|
125 |
+
"type": "WEB",
|
126 |
+
"url": "http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2"
|
127 |
+
},
|
128 |
+
{
|
129 |
+
"type": "WEB",
|
130 |
+
"url": "http://www.securityfocus.com/bid/105352"
|
131 |
+
}
|
132 |
+
],
|
133 |
+
"database_specific": {
|
134 |
+
"cwe_ids": [
|
135 |
+
"CWE-22"
|
136 |
+
],
|
137 |
+
"severity": "MODERATE",
|
138 |
+
"github_reviewed": true,
|
139 |
+
"github_reviewed_at": "2020-06-16T21:44:10Z",
|
140 |
+
"nvd_published_at": null
|
141 |
+
}
|
142 |
+
}
|
advisory/apache__camel_CVE-2019-0194_2.21.4.json
ADDED
@@ -0,0 +1,129 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-4wjq-69rc-8wcp",
|
4 |
+
"modified": "2022-11-17T17:45:21Z",
|
5 |
+
"published": "2019-05-02T15:21:34Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-0194"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal in Apache Camel",
|
10 |
+
"details": "Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.camel:camel-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.21.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.21.5"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.21.3"
|
38 |
+
}
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"package": {
|
42 |
+
"ecosystem": "Maven",
|
43 |
+
"name": "org.apache.camel:camel-core"
|
44 |
+
},
|
45 |
+
"ranges": [
|
46 |
+
{
|
47 |
+
"type": "ECOSYSTEM",
|
48 |
+
"events": [
|
49 |
+
{
|
50 |
+
"introduced": "2.22.0"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"fixed": "2.22.3"
|
54 |
+
}
|
55 |
+
]
|
56 |
+
}
|
57 |
+
]
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"package": {
|
61 |
+
"ecosystem": "Maven",
|
62 |
+
"name": "org.apache.camel:camel-core"
|
63 |
+
},
|
64 |
+
"ranges": [
|
65 |
+
{
|
66 |
+
"type": "ECOSYSTEM",
|
67 |
+
"events": [
|
68 |
+
{
|
69 |
+
"introduced": "2.23.0"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"fixed": "2.23.1"
|
73 |
+
}
|
74 |
+
]
|
75 |
+
}
|
76 |
+
],
|
77 |
+
"versions": [
|
78 |
+
"2.23.0"
|
79 |
+
]
|
80 |
+
}
|
81 |
+
],
|
82 |
+
"references": [
|
83 |
+
{
|
84 |
+
"type": "ADVISORY",
|
85 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"type": "WEB",
|
89 |
+
"url": "https://github.com/apache/camel/pull/2700"
|
90 |
+
},
|
91 |
+
{
|
92 |
+
"type": "PACKAGE",
|
93 |
+
"url": "https://github.com/apache/camel"
|
94 |
+
},
|
95 |
+
{
|
96 |
+
"type": "WEB",
|
97 |
+
"url": "https://issues.apache.org/jira/browse/CAMEL-13042"
|
98 |
+
},
|
99 |
+
{
|
100 |
+
"type": "WEB",
|
101 |
+
"url": "https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E"
|
102 |
+
},
|
103 |
+
{
|
104 |
+
"type": "WEB",
|
105 |
+
"url": "https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E"
|
106 |
+
},
|
107 |
+
{
|
108 |
+
"type": "WEB",
|
109 |
+
"url": "https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E"
|
110 |
+
},
|
111 |
+
{
|
112 |
+
"type": "WEB",
|
113 |
+
"url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"
|
114 |
+
},
|
115 |
+
{
|
116 |
+
"type": "WEB",
|
117 |
+
"url": "http://www.openwall.com/lists/oss-security/2019/04/30/2"
|
118 |
+
}
|
119 |
+
],
|
120 |
+
"database_specific": {
|
121 |
+
"cwe_ids": [
|
122 |
+
"CWE-22"
|
123 |
+
],
|
124 |
+
"severity": "HIGH",
|
125 |
+
"github_reviewed": true,
|
126 |
+
"github_reviewed_at": "2019-05-02T15:00:07Z",
|
127 |
+
"nvd_published_at": "2019-04-30T22:29:00Z"
|
128 |
+
}
|
129 |
+
}
|
advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json
ADDED
@@ -0,0 +1,69 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-vpgf-fgm8-gxr2",
|
4 |
+
"modified": "2022-11-01T13:29:32Z",
|
5 |
+
"published": "2022-10-28T12:00:33Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-26884"
|
8 |
+
],
|
9 |
+
"summary": "Apache DolphinScheduler vulnerable to Path Traversal",
|
10 |
+
"details": "Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.dolphinscheduler:dolphinscheduler"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.0.6"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26884"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "PACKAGE",
|
45 |
+
"url": "https://github.com/apache/dolphinscheduler"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://github.com/apache/dolphinscheduler/releases/tag/2.0.6"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jzrgmw2htyyb9c"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "http://www.openwall.com/lists/oss-security/2022/10/28/2"
|
58 |
+
}
|
59 |
+
],
|
60 |
+
"database_specific": {
|
61 |
+
"cwe_ids": [
|
62 |
+
"CWE-22"
|
63 |
+
],
|
64 |
+
"severity": "MODERATE",
|
65 |
+
"github_reviewed": true,
|
66 |
+
"github_reviewed_at": "2022-10-31T19:37:13Z",
|
67 |
+
"nvd_published_at": "2022-10-28T08:15:00Z"
|
68 |
+
}
|
69 |
+
}
|
advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json
ADDED
@@ -0,0 +1,61 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-fp35-xrrr-3gph",
|
4 |
+
"modified": "2022-11-02T21:45:12Z",
|
5 |
+
"published": "2022-11-01T19:00:29Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-34662"
|
8 |
+
],
|
9 |
+
"summary": "Apache DolphinScheduler vulnerable to Path Traversal",
|
10 |
+
"details": "When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.dolphinscheduler:dolphinscheduler"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "3.0.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34662"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "PACKAGE",
|
45 |
+
"url": "https://github.com/apache/dolphinscheduler"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8"
|
50 |
+
}
|
51 |
+
],
|
52 |
+
"database_specific": {
|
53 |
+
"cwe_ids": [
|
54 |
+
"CWE-22"
|
55 |
+
],
|
56 |
+
"severity": "MODERATE",
|
57 |
+
"github_reviewed": true,
|
58 |
+
"github_reviewed_at": "2022-11-01T21:04:38Z",
|
59 |
+
"nvd_published_at": "2022-11-01T16:15:00Z"
|
60 |
+
}
|
61 |
+
}
|
advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json
ADDED
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-qwxx-xww6-8q8m",
|
4 |
+
"modified": "2024-02-21T00:17:58Z",
|
5 |
+
"published": "2024-02-20T12:30:58Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-49109"
|
8 |
+
],
|
9 |
+
"summary": "Remote Code Execution in Apache Dolphinscheduler",
|
10 |
+
"details": "This issue affects Apache DolphinScheduler 3.0.0 before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue. ",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.dolphinscheduler:dolphinscheduler"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "3.0.0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "3.2.1"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
}
|
34 |
+
],
|
35 |
+
"references": [
|
36 |
+
{
|
37 |
+
"type": "ADVISORY",
|
38 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49109"
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"type": "WEB",
|
42 |
+
"url": "https://github.com/apache/dolphinscheduler/pull/14991"
|
43 |
+
},
|
44 |
+
{
|
45 |
+
"type": "PACKAGE",
|
46 |
+
"url": "https://github.com/apache/dolphinscheduler"
|
47 |
+
},
|
48 |
+
{
|
49 |
+
"type": "WEB",
|
50 |
+
"url": "https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"type": "WEB",
|
54 |
+
"url": "https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5"
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"type": "WEB",
|
58 |
+
"url": "http://www.openwall.com/lists/oss-security/2024/02/20/4"
|
59 |
+
}
|
60 |
+
],
|
61 |
+
"database_specific": {
|
62 |
+
"cwe_ids": [
|
63 |
+
"CWE-94"
|
64 |
+
],
|
65 |
+
"severity": "HIGH",
|
66 |
+
"github_reviewed": true,
|
67 |
+
"github_reviewed_at": "2024-02-21T00:17:58Z",
|
68 |
+
"nvd_published_at": "2024-02-20T10:15:07Z"
|
69 |
+
}
|
70 |
+
}
|
advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json
ADDED
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-ff2w-wm48-jhqj",
|
4 |
+
"modified": "2024-02-21T00:21:46Z",
|
5 |
+
"published": "2024-02-20T12:31:00Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-51770"
|
8 |
+
],
|
9 |
+
"summary": "Arbitrary File Read Vulnerability in Apache Dolphinscheduler",
|
10 |
+
"details": "Arbitrary File Read Vulnerability in Apache Dolphinscheduler.\n\nThis issue affects Apache DolphinScheduler: before 3.2.1. \n\nWe recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.dolphinscheduler:dolphinscheduler"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "3.2.1"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
}
|
34 |
+
],
|
35 |
+
"references": [
|
36 |
+
{
|
37 |
+
"type": "ADVISORY",
|
38 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51770"
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"type": "WEB",
|
42 |
+
"url": "https://github.com/apache/dolphinscheduler/pull/15433"
|
43 |
+
},
|
44 |
+
{
|
45 |
+
"type": "PACKAGE",
|
46 |
+
"url": "https://github.com/apache/dolphinscheduler"
|
47 |
+
},
|
48 |
+
{
|
49 |
+
"type": "WEB",
|
50 |
+
"url": "https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"type": "WEB",
|
54 |
+
"url": "https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw"
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"type": "WEB",
|
58 |
+
"url": "http://www.openwall.com/lists/oss-security/2024/02/20/2"
|
59 |
+
}
|
60 |
+
],
|
61 |
+
"database_specific": {
|
62 |
+
"cwe_ids": [
|
63 |
+
"CWE-94"
|
64 |
+
],
|
65 |
+
"severity": "HIGH",
|
66 |
+
"github_reviewed": true,
|
67 |
+
"github_reviewed_at": "2024-02-21T00:21:46Z",
|
68 |
+
"nvd_published_at": "2024-02-20T10:15:08Z"
|
69 |
+
}
|
70 |
+
}
|
advisory/apache__dubbo_CVE-2021-30180_2.7.9.json
ADDED
@@ -0,0 +1,58 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-7wfc-x4f7-gg2x",
|
4 |
+
"modified": "2022-03-18T17:58:01Z",
|
5 |
+
"published": "2022-03-18T17:58:01Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2021-30180"
|
8 |
+
],
|
9 |
+
"summary": "Code injection in Apache Dubbo",
|
10 |
+
"details": "Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.dubbo:dubbo"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.7.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.7.10"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E"
|
46 |
+
}
|
47 |
+
],
|
48 |
+
"database_specific": {
|
49 |
+
"cwe_ids": [
|
50 |
+
"CWE-444",
|
51 |
+
"CWE-94"
|
52 |
+
],
|
53 |
+
"severity": "CRITICAL",
|
54 |
+
"github_reviewed": true,
|
55 |
+
"github_reviewed_at": "2021-06-02T20:19:48Z",
|
56 |
+
"nvd_published_at": "2021-06-01T14:15:00Z"
|
57 |
+
}
|
58 |
+
}
|
advisory/apache__flink_CVE-2020-17519_1.11.2.json
ADDED
@@ -0,0 +1,138 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-395w-qhqr-9fr6",
|
4 |
+
"modified": "2021-01-06T20:01:15Z",
|
5 |
+
"published": "2021-01-06T20:01:34Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2020-17519"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal in Apache Flink",
|
10 |
+
"details": "A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.flink:flink-runtime_2.11"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "1.11.0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "1.11.3"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
},
|
34 |
+
{
|
35 |
+
"package": {
|
36 |
+
"ecosystem": "Maven",
|
37 |
+
"name": "org.apache.flink:flink-runtime_2.12"
|
38 |
+
},
|
39 |
+
"ranges": [
|
40 |
+
{
|
41 |
+
"type": "ECOSYSTEM",
|
42 |
+
"events": [
|
43 |
+
{
|
44 |
+
"introduced": "1.11.0"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"fixed": "1.11.3"
|
48 |
+
}
|
49 |
+
]
|
50 |
+
}
|
51 |
+
]
|
52 |
+
}
|
53 |
+
],
|
54 |
+
"references": [
|
55 |
+
{
|
56 |
+
"type": "ADVISORY",
|
57 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"type": "WEB",
|
69 |
+
"url": "https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"type": "WEB",
|
73 |
+
"url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E"
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"type": "WEB",
|
77 |
+
"url": "https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E"
|
78 |
+
},
|
79 |
+
{
|
80 |
+
"type": "WEB",
|
81 |
+
"url": "https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E"
|
82 |
+
},
|
83 |
+
{
|
84 |
+
"type": "WEB",
|
85 |
+
"url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"type": "WEB",
|
89 |
+
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E"
|
90 |
+
},
|
91 |
+
{
|
92 |
+
"type": "WEB",
|
93 |
+
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E"
|
94 |
+
},
|
95 |
+
{
|
96 |
+
"type": "WEB",
|
97 |
+
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E"
|
98 |
+
},
|
99 |
+
{
|
100 |
+
"type": "WEB",
|
101 |
+
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E"
|
102 |
+
},
|
103 |
+
{
|
104 |
+
"type": "WEB",
|
105 |
+
"url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E"
|
106 |
+
},
|
107 |
+
{
|
108 |
+
"type": "WEB",
|
109 |
+
"url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E"
|
110 |
+
},
|
111 |
+
{
|
112 |
+
"type": "WEB",
|
113 |
+
"url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"
|
114 |
+
},
|
115 |
+
{
|
116 |
+
"type": "WEB",
|
117 |
+
"url": "https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E"
|
118 |
+
},
|
119 |
+
{
|
120 |
+
"type": "WEB",
|
121 |
+
"url": "http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html"
|
122 |
+
},
|
123 |
+
{
|
124 |
+
"type": "WEB",
|
125 |
+
"url": "http://www.openwall.com/lists/oss-security/2021/01/05/2"
|
126 |
+
}
|
127 |
+
],
|
128 |
+
"database_specific": {
|
129 |
+
"cwe_ids": [
|
130 |
+
"CWE-22",
|
131 |
+
"CWE-552"
|
132 |
+
],
|
133 |
+
"severity": "MODERATE",
|
134 |
+
"github_reviewed": true,
|
135 |
+
"github_reviewed_at": "2021-01-06T20:01:15Z",
|
136 |
+
"nvd_published_at": "2021-01-05T12:15:00Z"
|
137 |
+
}
|
138 |
+
}
|
advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json
ADDED
@@ -0,0 +1,76 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-qmfc-6www-fjqw",
|
4 |
+
"modified": "2022-03-18T17:57:04Z",
|
5 |
+
"published": "2022-03-18T17:57:04Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2021-30181"
|
8 |
+
],
|
9 |
+
"summary": "Code injection in Apache Dubbo",
|
10 |
+
"details": "Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "com.alibaba:dubbo"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.5.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.6.9"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.dubbo:dubbo"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "2.5.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.7.10"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30181"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E"
|
65 |
+
}
|
66 |
+
],
|
67 |
+
"database_specific": {
|
68 |
+
"cwe_ids": [
|
69 |
+
"CWE-94"
|
70 |
+
],
|
71 |
+
"severity": "CRITICAL",
|
72 |
+
"github_reviewed": true,
|
73 |
+
"github_reviewed_at": "2021-06-02T20:15:20Z",
|
74 |
+
"nvd_published_at": "2021-06-01T14:15:00Z"
|
75 |
+
}
|
76 |
+
}
|
advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json
ADDED
@@ -0,0 +1,92 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-pffw-p2q5-w6vh",
|
4 |
+
"modified": "2022-09-17T00:13:09Z",
|
5 |
+
"published": "2019-04-08T16:23:36Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-0225"
|
8 |
+
],
|
9 |
+
"summary": "Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war",
|
10 |
+
"details": "A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.9.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0.M3"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.11.0.M2"
|
38 |
+
}
|
39 |
+
}
|
40 |
+
],
|
41 |
+
"references": [
|
42 |
+
{
|
43 |
+
"type": "ADVISORY",
|
44 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0225"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"type": "ADVISORY",
|
48 |
+
"url": "https://github.com/advisories/GHSA-pffw-p2q5-w6vh"
|
49 |
+
},
|
50 |
+
{
|
51 |
+
"type": "WEB",
|
52 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225"
|
53 |
+
},
|
54 |
+
{
|
55 |
+
"type": "WEB",
|
56 |
+
"url": "https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E"
|
57 |
+
},
|
58 |
+
{
|
59 |
+
"type": "WEB",
|
60 |
+
"url": "https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "http://www.openwall.com/lists/oss-security/2019/03/26/2"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "http://www.securityfocus.com/bid/107627"
|
81 |
+
}
|
82 |
+
],
|
83 |
+
"database_specific": {
|
84 |
+
"cwe_ids": [
|
85 |
+
"CWE-22"
|
86 |
+
],
|
87 |
+
"severity": "HIGH",
|
88 |
+
"github_reviewed": true,
|
89 |
+
"github_reviewed_at": "2020-06-16T21:49:01Z",
|
90 |
+
"nvd_published_at": null
|
91 |
+
}
|
92 |
+
}
|
advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json
ADDED
@@ -0,0 +1,94 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-cxx2-fp39-rf3r",
|
4 |
+
"modified": "2021-08-04T19:53:10Z",
|
5 |
+
"published": "2019-06-06T15:29:22Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-10076"
|
8 |
+
],
|
9 |
+
"summary": "Cross-Site Scripting in JSPWiki",
|
10 |
+
"details": "A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.9.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0.M4"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
38 |
+
}
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"package": {
|
42 |
+
"ecosystem": "Maven",
|
43 |
+
"name": "org.apache.jspwiki:jspwiki-main"
|
44 |
+
},
|
45 |
+
"ranges": [
|
46 |
+
{
|
47 |
+
"type": "ECOSYSTEM",
|
48 |
+
"events": [
|
49 |
+
{
|
50 |
+
"introduced": "2.9.0"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"fixed": "2.11.0.M4"
|
54 |
+
}
|
55 |
+
]
|
56 |
+
}
|
57 |
+
],
|
58 |
+
"database_specific": {
|
59 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
60 |
+
}
|
61 |
+
}
|
62 |
+
],
|
63 |
+
"references": [
|
64 |
+
{
|
65 |
+
"type": "ADVISORY",
|
66 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10076"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"type": "WEB",
|
70 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076"
|
71 |
+
},
|
72 |
+
{
|
73 |
+
"type": "WEB",
|
74 |
+
"url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E"
|
75 |
+
},
|
76 |
+
{
|
77 |
+
"type": "WEB",
|
78 |
+
"url": "http://www.openwall.com/lists/oss-security/2019/05/19/4"
|
79 |
+
},
|
80 |
+
{
|
81 |
+
"type": "WEB",
|
82 |
+
"url": "http://www.securityfocus.com/bid/108437"
|
83 |
+
}
|
84 |
+
],
|
85 |
+
"database_specific": {
|
86 |
+
"cwe_ids": [
|
87 |
+
"CWE-79"
|
88 |
+
],
|
89 |
+
"severity": "MODERATE",
|
90 |
+
"github_reviewed": true,
|
91 |
+
"github_reviewed_at": "2019-05-29T19:05:23Z",
|
92 |
+
"nvd_published_at": null
|
93 |
+
}
|
94 |
+
}
|
advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json
ADDED
@@ -0,0 +1,82 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-cj6j-32rg-45r2",
|
4 |
+
"modified": "2021-08-04T19:54:08Z",
|
5 |
+
"published": "2019-06-06T15:29:25Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-10077"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site Scripting in JSPWiki",
|
10 |
+
"details": "A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.9.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0.M4"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
38 |
+
}
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"package": {
|
42 |
+
"ecosystem": "Maven",
|
43 |
+
"name": "org.apache.jspwiki:jspwiki-main"
|
44 |
+
},
|
45 |
+
"ranges": [
|
46 |
+
{
|
47 |
+
"type": "ECOSYSTEM",
|
48 |
+
"events": [
|
49 |
+
{
|
50 |
+
"introduced": "2.9.0"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"fixed": "2.11.0.M4"
|
54 |
+
}
|
55 |
+
]
|
56 |
+
}
|
57 |
+
],
|
58 |
+
"database_specific": {
|
59 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
60 |
+
}
|
61 |
+
}
|
62 |
+
],
|
63 |
+
"references": [
|
64 |
+
{
|
65 |
+
"type": "ADVISORY",
|
66 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10077"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"type": "WEB",
|
70 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077"
|
71 |
+
}
|
72 |
+
],
|
73 |
+
"database_specific": {
|
74 |
+
"cwe_ids": [
|
75 |
+
"CWE-79"
|
76 |
+
],
|
77 |
+
"severity": "MODERATE",
|
78 |
+
"github_reviewed": true,
|
79 |
+
"github_reviewed_at": "2019-05-29T19:05:35Z",
|
80 |
+
"nvd_published_at": "2019-05-20T21:29:00Z"
|
81 |
+
}
|
82 |
+
}
|
advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json
ADDED
@@ -0,0 +1,82 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-hp5r-mhgp-56c9",
|
4 |
+
"modified": "2021-08-04T20:00:07Z",
|
5 |
+
"published": "2019-06-06T15:29:29Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-10078"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site Scriptin in JSPWiki",
|
10 |
+
"details": "A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.9.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0.M4"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
38 |
+
}
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"package": {
|
42 |
+
"ecosystem": "Maven",
|
43 |
+
"name": "org.apache.jspwiki:jspwiki-main"
|
44 |
+
},
|
45 |
+
"ranges": [
|
46 |
+
{
|
47 |
+
"type": "ECOSYSTEM",
|
48 |
+
"events": [
|
49 |
+
{
|
50 |
+
"introduced": "2.9.0"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"fixed": "2.11.0.M4"
|
54 |
+
}
|
55 |
+
]
|
56 |
+
}
|
57 |
+
],
|
58 |
+
"database_specific": {
|
59 |
+
"last_known_affected_version_range": "<= 2.11.0.M3"
|
60 |
+
}
|
61 |
+
}
|
62 |
+
],
|
63 |
+
"references": [
|
64 |
+
{
|
65 |
+
"type": "ADVISORY",
|
66 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10078"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"type": "WEB",
|
70 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078"
|
71 |
+
}
|
72 |
+
],
|
73 |
+
"database_specific": {
|
74 |
+
"cwe_ids": [
|
75 |
+
"CWE-79"
|
76 |
+
],
|
77 |
+
"severity": "MODERATE",
|
78 |
+
"github_reviewed": true,
|
79 |
+
"github_reviewed_at": "2019-05-29T19:05:49Z",
|
80 |
+
"nvd_published_at": "2019-05-20T21:29:00Z"
|
81 |
+
}
|
82 |
+
}
|
advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json
ADDED
@@ -0,0 +1,60 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-3rx2-x6mx-grj3",
|
4 |
+
"modified": "2021-08-17T22:35:54Z",
|
5 |
+
"published": "2019-10-11T18:41:54Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-10089"
|
8 |
+
],
|
9 |
+
"summary": "Cross-site scripting in Apache JSPWiki",
|
10 |
+
"details": "On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.9.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0.M5"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 2.11.0.M4"
|
38 |
+
}
|
39 |
+
}
|
40 |
+
],
|
41 |
+
"references": [
|
42 |
+
{
|
43 |
+
"type": "ADVISORY",
|
44 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10089"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"type": "WEB",
|
48 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089"
|
49 |
+
}
|
50 |
+
],
|
51 |
+
"database_specific": {
|
52 |
+
"cwe_ids": [
|
53 |
+
"CWE-79"
|
54 |
+
],
|
55 |
+
"severity": "MODERATE",
|
56 |
+
"github_reviewed": true,
|
57 |
+
"github_reviewed_at": "2019-09-25T12:33:32Z",
|
58 |
+
"nvd_published_at": "2019-09-23T15:15:00Z"
|
59 |
+
}
|
60 |
+
}
|
advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json
ADDED
@@ -0,0 +1,120 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-qvq8-cw7f-m7m4",
|
4 |
+
"modified": "2023-06-03T00:39:55Z",
|
5 |
+
"published": "2023-05-25T09:30:25Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-46907"
|
8 |
+
],
|
9 |
+
"summary": "Apache JSPWiki vulnerable to cross-site scripting on several plugins",
|
10 |
+
"details": "A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.jspwiki:jspwiki-main"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.12.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.jspwiki:jspwiki-war"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.12.0"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46907"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/apache/jspwiki/commit/0b9a0149032170063f22d65e335dfd317db815ea"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/apache/jspwiki/commit/46e1ef7a595ca5cabf5ef184139910413f2024fc"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://github.com/apache/jspwiki/commit/484c6a133e397693991b7c9a9b62ef3ca48ce707"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://github.com/apache/jspwiki/commit/75019d337f1d0033b1f65428e75f43baeffd99dd"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "https://github.com/apache/jspwiki/commit/82be08904a6d8bd22fa2d4e5a7e85f43408724d3"
|
81 |
+
},
|
82 |
+
{
|
83 |
+
"type": "WEB",
|
84 |
+
"url": "https://github.com/apache/jspwiki/commit/9d6dbf911d52d724297e4e46c4b80649fb028ff9"
|
85 |
+
},
|
86 |
+
{
|
87 |
+
"type": "WEB",
|
88 |
+
"url": "https://github.com/apache/jspwiki/commit/df20770f251a8d7431047e556b144ef24ee6a3a7"
|
89 |
+
},
|
90 |
+
{
|
91 |
+
"type": "PACKAGE",
|
92 |
+
"url": "https://github.com/apache/jspwiki"
|
93 |
+
},
|
94 |
+
{
|
95 |
+
"type": "WEB",
|
96 |
+
"url": "https://github.com/apache/jspwiki/blob/37bf55373ed5a739a388a720163cf51d1104537f/ChangeLog.md?plain=1#L112"
|
97 |
+
},
|
98 |
+
{
|
99 |
+
"type": "WEB",
|
100 |
+
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-46907"
|
101 |
+
},
|
102 |
+
{
|
103 |
+
"type": "WEB",
|
104 |
+
"url": "https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504"
|
105 |
+
},
|
106 |
+
{
|
107 |
+
"type": "WEB",
|
108 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/05/25/1"
|
109 |
+
}
|
110 |
+
],
|
111 |
+
"database_specific": {
|
112 |
+
"cwe_ids": [
|
113 |
+
"CWE-79"
|
114 |
+
],
|
115 |
+
"severity": "MODERATE",
|
116 |
+
"github_reviewed": true,
|
117 |
+
"github_reviewed_at": "2023-05-25T17:38:08Z",
|
118 |
+
"nvd_published_at": "2023-05-25T07:15:08Z"
|
119 |
+
}
|
120 |
+
}
|
advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json
ADDED
@@ -0,0 +1,120 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-mjmq-gwgm-5qhm",
|
4 |
+
"modified": "2023-12-07T18:20:03Z",
|
5 |
+
"published": "2023-07-10T18:30:49Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-35887"
|
8 |
+
],
|
9 |
+
"summary": "Apache MINA SSHD information disclosure vulnerability",
|
10 |
+
"details": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.\n\nIn SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover \"exists/does not exist\" information about items outside the rooted tree via paths including parent navigation (\"..\") beyond the root, or involving symlinks.\n\nThis issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3\n\nUntil version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.sshd:sshd-common"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.1.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.9.3"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.sshd:sshd-sftp"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "1.0.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.9.3"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.apache.sshd:sshd-core"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "1.0.0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "2.1.0"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
}
|
75 |
+
],
|
76 |
+
"references": [
|
77 |
+
{
|
78 |
+
"type": "ADVISORY",
|
79 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887"
|
80 |
+
},
|
81 |
+
{
|
82 |
+
"type": "WEB",
|
83 |
+
"url": "https://github.com/apache/mina-sshd/pull/362"
|
84 |
+
},
|
85 |
+
{
|
86 |
+
"type": "WEB",
|
87 |
+
"url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0"
|
88 |
+
},
|
89 |
+
{
|
90 |
+
"type": "WEB",
|
91 |
+
"url": "https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0"
|
92 |
+
},
|
93 |
+
{
|
94 |
+
"type": "WEB",
|
95 |
+
"url": "https://github.com/apache/mina-sshd/commit/c20739b43aab0f7bf2ccad982a6cb37b9d5a8a0b"
|
96 |
+
},
|
97 |
+
{
|
98 |
+
"type": "PACKAGE",
|
99 |
+
"url": "https://github.com/apache/mina-sshd"
|
100 |
+
},
|
101 |
+
{
|
102 |
+
"type": "WEB",
|
103 |
+
"url": "https://issues.apache.org/jira/browse/SSHD-1324"
|
104 |
+
},
|
105 |
+
{
|
106 |
+
"type": "WEB",
|
107 |
+
"url": "https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2"
|
108 |
+
}
|
109 |
+
],
|
110 |
+
"database_specific": {
|
111 |
+
"cwe_ids": [
|
112 |
+
"CWE-200",
|
113 |
+
"CWE-22"
|
114 |
+
],
|
115 |
+
"severity": "MODERATE",
|
116 |
+
"github_reviewed": true,
|
117 |
+
"github_reviewed_at": "2023-07-10T21:53:01Z",
|
118 |
+
"nvd_published_at": "2023-07-10T16:15:53Z"
|
119 |
+
}
|
120 |
+
}
|
advisory/apache__myfaces_CVE-2011-4367_2.0.11.json
ADDED
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-gjfx-9wx3-j6r7",
|
4 |
+
"modified": "2023-08-16T23:00:39Z",
|
5 |
+
"published": "2022-05-13T01:24:34Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2011-4367"
|
8 |
+
],
|
9 |
+
"summary": "Apache MyFaces Vulnerable to Path Traversal",
|
10 |
+
"details": "Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a `..` (dot dot) in the (1) ln parameter to `faces/javax.faces.resource/web.xml` or (2) the `PATH_INFO` to `faces/javax.faces.resource/`.",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.myfaces.core:myfaces-impl"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "2.0.0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "2.0.12"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
},
|
34 |
+
{
|
35 |
+
"package": {
|
36 |
+
"ecosystem": "Maven",
|
37 |
+
"name": "org.apache.myfaces.core:myfaces-impl"
|
38 |
+
},
|
39 |
+
"ranges": [
|
40 |
+
{
|
41 |
+
"type": "ECOSYSTEM",
|
42 |
+
"events": [
|
43 |
+
{
|
44 |
+
"introduced": "2.1.0"
|
45 |
+
},
|
46 |
+
{
|
47 |
+
"fixed": "2.1.6"
|
48 |
+
}
|
49 |
+
]
|
50 |
+
}
|
51 |
+
]
|
52 |
+
}
|
53 |
+
],
|
54 |
+
"references": [
|
55 |
+
{
|
56 |
+
"type": "ADVISORY",
|
57 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4367"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73100"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939"
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"type": "WEB",
|
69 |
+
"url": "http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"type": "WEB",
|
73 |
+
"url": "http://seclists.org/fulldisclosure/2012/Feb/150"
|
74 |
+
}
|
75 |
+
],
|
76 |
+
"database_specific": {
|
77 |
+
"cwe_ids": [
|
78 |
+
"CWE-22"
|
79 |
+
],
|
80 |
+
"severity": "MODERATE",
|
81 |
+
"github_reviewed": true,
|
82 |
+
"github_reviewed_at": "2022-11-02T00:42:02Z",
|
83 |
+
"nvd_published_at": "2014-06-19T14:55:00Z"
|
84 |
+
}
|
85 |
+
}
|
advisory/apache__nifi_CVE-2022-33140_1.16.2.json
ADDED
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-77hf-23pq-2g7c",
|
4 |
+
"modified": "2022-11-03T22:19:38Z",
|
5 |
+
"published": "2022-06-16T00:00:26Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-33140"
|
8 |
+
],
|
9 |
+
"summary": "Code injection in Apache NiFi and NiFi Registry",
|
10 |
+
"details": "The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.nifi.registry:nifi-registry-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0.6.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.16.3"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.nifi:nifi"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "1.10.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "1.16.3"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33140"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "PACKAGE",
|
64 |
+
"url": "https://github.com/apache/nifi"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://nifi.apache.org/security.html#CVE-2022-33140"
|
73 |
+
}
|
74 |
+
],
|
75 |
+
"database_specific": {
|
76 |
+
"cwe_ids": [
|
77 |
+
"CWE-74",
|
78 |
+
"CWE-78"
|
79 |
+
],
|
80 |
+
"severity": "HIGH",
|
81 |
+
"github_reviewed": true,
|
82 |
+
"github_reviewed_at": "2022-06-17T21:49:10Z",
|
83 |
+
"nvd_published_at": "2022-06-15T15:15:00Z"
|
84 |
+
}
|
85 |
+
}
|
advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json
ADDED
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-5x3v-2gxr-59m2",
|
4 |
+
"modified": "2021-04-07T19:55:55Z",
|
5 |
+
"published": "2020-07-01T17:26:15Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-17572"
|
8 |
+
],
|
9 |
+
"summary": "Directory traversal in Apache RocketMQ",
|
10 |
+
"details": "In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.rocketmq:rocketmq-broker"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "4.2.0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "4.6.1"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
}
|
34 |
+
],
|
35 |
+
"references": [
|
36 |
+
{
|
37 |
+
"type": "ADVISORY",
|
38 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17572"
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"type": "WEB",
|
42 |
+
"url": "https://github.com/apache/rocketmq/issues/1637"
|
43 |
+
},
|
44 |
+
{
|
45 |
+
"type": "WEB",
|
46 |
+
"url": "https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552"
|
47 |
+
},
|
48 |
+
{
|
49 |
+
"type": "WEB",
|
50 |
+
"url": "https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"type": "WEB",
|
54 |
+
"url": "https://seclists.org/oss-sec/2020/q2/112"
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"type": "WEB",
|
58 |
+
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108"
|
59 |
+
}
|
60 |
+
],
|
61 |
+
"database_specific": {
|
62 |
+
"cwe_ids": [
|
63 |
+
"CWE-22"
|
64 |
+
],
|
65 |
+
"severity": "MODERATE",
|
66 |
+
"github_reviewed": true,
|
67 |
+
"github_reviewed_at": "2020-07-01T17:26:05Z",
|
68 |
+
"nvd_published_at": null
|
69 |
+
}
|
70 |
+
}
|
advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json
ADDED
@@ -0,0 +1,134 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-x3cq-8f32-5f63",
|
4 |
+
"modified": "2023-07-12T14:46:52Z",
|
5 |
+
"published": "2023-07-06T21:15:04Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-33246"
|
8 |
+
],
|
9 |
+
"summary": "Apache RocketMQ may have remote code execution vulnerability when using update configuration function",
|
10 |
+
"details": "For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. \n\nSeveral components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. \n\nTo prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.rocketmq:rocketmq-broker"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "5.0.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "5.1.1"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.rocketmq:rocketmq-namesrv"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "4.0.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "4.9.6"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.apache.rocketmq:rocketmq-controller"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "5.0.0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "5.1.1"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"package": {
|
77 |
+
"ecosystem": "Maven",
|
78 |
+
"name": "org.apache.rocketmq:rocketmq-namesrv"
|
79 |
+
},
|
80 |
+
"ranges": [
|
81 |
+
{
|
82 |
+
"type": "ECOSYSTEM",
|
83 |
+
"events": [
|
84 |
+
{
|
85 |
+
"introduced": "5.0.0"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"fixed": "5.1.1"
|
89 |
+
}
|
90 |
+
]
|
91 |
+
}
|
92 |
+
]
|
93 |
+
}
|
94 |
+
],
|
95 |
+
"references": [
|
96 |
+
{
|
97 |
+
"type": "ADVISORY",
|
98 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246"
|
99 |
+
},
|
100 |
+
{
|
101 |
+
"type": "WEB",
|
102 |
+
"url": "https://github.com/apache/rocketmq/commit/9d411cf04a695e7a3f41036e8377b0aa544d754d"
|
103 |
+
},
|
104 |
+
{
|
105 |
+
"type": "WEB",
|
106 |
+
"url": "https://github.com/apache/rocketmq/commit/c3ada731405c5990c36bf58d50b3e61965300703"
|
107 |
+
},
|
108 |
+
{
|
109 |
+
"type": "PACKAGE",
|
110 |
+
"url": "https://github.com/apache/rocketmq"
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"type": "WEB",
|
114 |
+
"url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp"
|
115 |
+
},
|
116 |
+
{
|
117 |
+
"type": "WEB",
|
118 |
+
"url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html"
|
119 |
+
},
|
120 |
+
{
|
121 |
+
"type": "WEB",
|
122 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/07/12/1"
|
123 |
+
}
|
124 |
+
],
|
125 |
+
"database_specific": {
|
126 |
+
"cwe_ids": [
|
127 |
+
"CWE-94"
|
128 |
+
],
|
129 |
+
"severity": "CRITICAL",
|
130 |
+
"github_reviewed": true,
|
131 |
+
"github_reviewed_at": "2023-07-06T23:48:22Z",
|
132 |
+
"nvd_published_at": "2023-05-24T15:15:09Z"
|
133 |
+
}
|
134 |
+
}
|
advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json
ADDED
@@ -0,0 +1,84 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-gpq8-963w-8qc9",
|
4 |
+
"modified": "2023-07-20T14:54:54Z",
|
5 |
+
"published": "2023-07-12T12:31:36Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-37582"
|
8 |
+
],
|
9 |
+
"summary": "RocketMQ NameServer component Code Injection vulnerability",
|
10 |
+
"details": "The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. \n\nWhen NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. \n\nIt is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.rocketmq:rocketmq-namesrv"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "4.9.7"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.rocketmq:rocketmq-namesrv"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "5.0.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "5.1.2"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "PACKAGE",
|
64 |
+
"url": "https://github.com/apache/rocketmq"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/07/12/1"
|
73 |
+
}
|
74 |
+
],
|
75 |
+
"database_specific": {
|
76 |
+
"cwe_ids": [
|
77 |
+
"CWE-94"
|
78 |
+
],
|
79 |
+
"severity": "CRITICAL",
|
80 |
+
"github_reviewed": true,
|
81 |
+
"github_reviewed_at": "2023-07-12T17:30:39Z",
|
82 |
+
"nvd_published_at": "2023-07-12T10:15:11Z"
|
83 |
+
}
|
84 |
+
}
|
advisory/apache__shiro_CVE-2023-34478_1.11.0.json
ADDED
@@ -0,0 +1,92 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-pmhc-2g4f-85cg",
|
4 |
+
"modified": "2023-09-15T18:29:37Z",
|
5 |
+
"published": "2023-07-24T21:30:39Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-34478"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal in Apache Shiro",
|
10 |
+
"details": "Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.\n\nMitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.shiro:shiro-web"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.12.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.shiro:shiro-web"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "2.0.0-alpha-1"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.0.0-alpha-3"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34478"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/apache/shiro/commit/c3ede3f94efb442acb0795714a022c2c121d1da0"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "PACKAGE",
|
68 |
+
"url": "https://github.com/apache/shiro"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://security.netapp.com/advisory/ntap-20230915-0005"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/07/24/4"
|
81 |
+
}
|
82 |
+
],
|
83 |
+
"database_specific": {
|
84 |
+
"cwe_ids": [
|
85 |
+
"CWE-22"
|
86 |
+
],
|
87 |
+
"severity": "CRITICAL",
|
88 |
+
"github_reviewed": true,
|
89 |
+
"github_reviewed_at": "2023-07-25T13:51:45Z",
|
90 |
+
"nvd_published_at": "2023-07-24T19:15:10Z"
|
91 |
+
}
|
92 |
+
}
|
advisory/apache__shiro_CVE-2023-46749_1.12.0.json
ADDED
@@ -0,0 +1,79 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-jc7h-c423-mpjc",
|
4 |
+
"modified": "2024-01-22T21:32:36Z",
|
5 |
+
"published": "2024-01-15T12:30:19Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-46749"
|
8 |
+
],
|
9 |
+
"summary": "Apache Shiro vulnerable to path traversal",
|
10 |
+
"details": "Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting \n\nMitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).\n\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.shiro:shiro-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.13.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.shiro:shiro-core"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "2.0.0alpha1"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "2.0.0-alpha4"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
],
|
55 |
+
"database_specific": {
|
56 |
+
"last_known_affected_version_range": "< 2.0.0alpha4"
|
57 |
+
}
|
58 |
+
}
|
59 |
+
],
|
60 |
+
"references": [
|
61 |
+
{
|
62 |
+
"type": "ADVISORY",
|
63 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749"
|
64 |
+
},
|
65 |
+
{
|
66 |
+
"type": "WEB",
|
67 |
+
"url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm"
|
68 |
+
}
|
69 |
+
],
|
70 |
+
"database_specific": {
|
71 |
+
"cwe_ids": [
|
72 |
+
"CWE-22"
|
73 |
+
],
|
74 |
+
"severity": "MODERATE",
|
75 |
+
"github_reviewed": true,
|
76 |
+
"github_reviewed_at": "2024-01-16T20:34:50Z",
|
77 |
+
"nvd_published_at": "2024-01-15T10:15:26Z"
|
78 |
+
}
|
79 |
+
}
|
advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json
ADDED
@@ -0,0 +1,69 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-h2rq-qhr7-53gm",
|
4 |
+
"modified": "2024-02-14T14:52:14Z",
|
5 |
+
"published": "2024-02-06T12:30:30Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2024-23673"
|
8 |
+
],
|
9 |
+
"summary": "Apache Sling Servlets Resolver executes malicious code via path traversal",
|
10 |
+
"details": "\nMalicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script. \n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.sling:org.apache.sling.servlets.resolver"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.11.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "PACKAGE",
|
49 |
+
"url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "http://www.openwall.com/lists/oss-security/2024/02/06/1"
|
58 |
+
}
|
59 |
+
],
|
60 |
+
"database_specific": {
|
61 |
+
"cwe_ids": [
|
62 |
+
"CWE-22"
|
63 |
+
],
|
64 |
+
"severity": "HIGH",
|
65 |
+
"github_reviewed": true,
|
66 |
+
"github_reviewed_at": "2024-02-06T18:24:31Z",
|
67 |
+
"nvd_published_at": "2024-02-06T10:15:08Z"
|
68 |
+
}
|
69 |
+
}
|
advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json
ADDED
@@ -0,0 +1,88 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-xwf4-88xr-hx2j",
|
4 |
+
"modified": "2022-11-03T19:12:07Z",
|
5 |
+
"published": "2022-05-13T01:25:29Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2016-5394"
|
8 |
+
],
|
9 |
+
"summary": "Cross site scripting in Apache Sling",
|
10 |
+
"details": "In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.sling:org.apache.sling.xss"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.0.12"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.sling:org.apache.sling.xss.compat"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "1.1.0"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5394"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/apache/sling-org-apache-sling-xss/commit/de32b144ad2be3367559f6184d560db42a220529"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2016-5394"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://lists.apache.org/thread.html/332166037a54b97cf41e2b616aaed38439de94b19b204841478e4525@%3Cdev.sling.apache.org%3E"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "http://www.securityfocus.com/bid/99870"
|
77 |
+
}
|
78 |
+
],
|
79 |
+
"database_specific": {
|
80 |
+
"cwe_ids": [
|
81 |
+
"CWE-79"
|
82 |
+
],
|
83 |
+
"severity": "MODERATE",
|
84 |
+
"github_reviewed": true,
|
85 |
+
"github_reviewed_at": "2022-11-03T19:12:07Z",
|
86 |
+
"nvd_published_at": "2017-07-19T15:29:00Z"
|
87 |
+
}
|
88 |
+
}
|
advisory/apache__struts_CVE-2020-17530_2.5.25.json
ADDED
@@ -0,0 +1,98 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-jc35-q369-45pv",
|
4 |
+
"modified": "2022-02-08T22:01:20Z",
|
5 |
+
"published": "2022-02-09T22:51:56Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2020-17530"
|
8 |
+
],
|
9 |
+
"summary": "Remote code execution in Apache Struts",
|
10 |
+
"details": "Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.struts:struts2-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "2.0.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.5.26"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://cwiki.apache.org/confluence/display/WW/S2-061"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://security.netapp.com/advisory/ntap-20210115-0005"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
54 |
+
},
|
55 |
+
{
|
56 |
+
"type": "WEB",
|
57 |
+
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
58 |
+
},
|
59 |
+
{
|
60 |
+
"type": "WEB",
|
61 |
+
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
62 |
+
},
|
63 |
+
{
|
64 |
+
"type": "WEB",
|
65 |
+
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
66 |
+
},
|
67 |
+
{
|
68 |
+
"type": "WEB",
|
69 |
+
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
70 |
+
},
|
71 |
+
{
|
72 |
+
"type": "WEB",
|
73 |
+
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"type": "WEB",
|
77 |
+
"url": "http://jvn.jp/en/jp/JVN43969166/index.html"
|
78 |
+
},
|
79 |
+
{
|
80 |
+
"type": "WEB",
|
81 |
+
"url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html"
|
82 |
+
},
|
83 |
+
{
|
84 |
+
"type": "WEB",
|
85 |
+
"url": "http://www.openwall.com/lists/oss-security/2022/04/12/6"
|
86 |
+
}
|
87 |
+
],
|
88 |
+
"database_specific": {
|
89 |
+
"cwe_ids": [
|
90 |
+
"CWE-917",
|
91 |
+
"CWE-94"
|
92 |
+
],
|
93 |
+
"severity": "CRITICAL",
|
94 |
+
"github_reviewed": true,
|
95 |
+
"github_reviewed_at": "2021-04-09T21:42:05Z",
|
96 |
+
"nvd_published_at": "2020-12-11T02:15:00Z"
|
97 |
+
}
|
98 |
+
}
|
advisory/apache__tika_CVE-2018-11762_1.18.json
ADDED
@@ -0,0 +1,65 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-w6g3-v46q-5p28",
|
4 |
+
"modified": "2021-09-21T17:58:38Z",
|
5 |
+
"published": "2018-10-17T15:49:58Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2018-11762"
|
8 |
+
],
|
9 |
+
"summary": "Moderate severity vulnerability that affects org.apache.tika:tika-core",
|
10 |
+
"details": "In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as \"C:/evil.bat\", tika-app would overwrite that file.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.tika:tika-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0.9"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.19"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11762"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "ADVISORY",
|
45 |
+
"url": "https://github.com/advisories/GHSA-w6g3-v46q-5p28"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E"
|
50 |
+
},
|
51 |
+
{
|
52 |
+
"type": "WEB",
|
53 |
+
"url": "http://www.securityfocus.com/bid/105515"
|
54 |
+
}
|
55 |
+
],
|
56 |
+
"database_specific": {
|
57 |
+
"cwe_ids": [
|
58 |
+
"CWE-22"
|
59 |
+
],
|
60 |
+
"severity": "MODERATE",
|
61 |
+
"github_reviewed": true,
|
62 |
+
"github_reviewed_at": "2020-06-16T21:59:47Z",
|
63 |
+
"nvd_published_at": null
|
64 |
+
}
|
65 |
+
}
|
advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json
ADDED
@@ -0,0 +1,61 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-xgqr-5wqw-9fpv",
|
4 |
+
"modified": "2022-11-04T20:44:39Z",
|
5 |
+
"published": "2022-11-03T19:00:26Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-32287"
|
8 |
+
],
|
9 |
+
"summary": "Apache UIMA Path Traversal vulnerability",
|
10 |
+
"details": "A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.uima:uimaj-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "3.3.1"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
}
|
37 |
+
],
|
38 |
+
"references": [
|
39 |
+
{
|
40 |
+
"type": "ADVISORY",
|
41 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32287"
|
42 |
+
},
|
43 |
+
{
|
44 |
+
"type": "WEB",
|
45 |
+
"url": "https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935yv1shdd"
|
46 |
+
},
|
47 |
+
{
|
48 |
+
"type": "WEB",
|
49 |
+
"url": "http://www.openwall.com/lists/oss-security/2022/11/03/4"
|
50 |
+
}
|
51 |
+
],
|
52 |
+
"database_specific": {
|
53 |
+
"cwe_ids": [
|
54 |
+
"CWE-22"
|
55 |
+
],
|
56 |
+
"severity": "HIGH",
|
57 |
+
"github_reviewed": true,
|
58 |
+
"github_reviewed_at": "2022-11-03T21:11:17Z",
|
59 |
+
"nvd_published_at": "2022-11-03T12:15:00Z"
|
60 |
+
}
|
61 |
+
}
|
advisory/asf__commons-io_CVE-2021-29425_2.6.json
ADDED
@@ -0,0 +1,391 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-gwrp-pvrq-jmwv",
|
4 |
+
"modified": "2024-02-14T20:25:59Z",
|
5 |
+
"published": "2021-04-26T16:04:00Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2021-29425"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal and Improper Input Validation in Apache Commons IO",
|
10 |
+
"details": "In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "commons-io:commons-io"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "2.7"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "com.cosium.vet:vet"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "1.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"last_affected": "3.22"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "com.diamondq.common:common-thirdparty.jcasbin"
|
60 |
+
},
|
61 |
+
"versions": [
|
62 |
+
"1.4.0"
|
63 |
+
]
|
64 |
+
},
|
65 |
+
{
|
66 |
+
"package": {
|
67 |
+
"ecosystem": "Maven",
|
68 |
+
"name": "com.liferay:com.liferay.sass.compiler.jsass"
|
69 |
+
},
|
70 |
+
"versions": [
|
71 |
+
"1.0.1"
|
72 |
+
]
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"package": {
|
76 |
+
"ecosystem": "Maven",
|
77 |
+
"name": "com.virjar:ratel-api"
|
78 |
+
},
|
79 |
+
"ranges": [
|
80 |
+
{
|
81 |
+
"type": "ECOSYSTEM",
|
82 |
+
"events": [
|
83 |
+
{
|
84 |
+
"introduced": "1.0.0"
|
85 |
+
},
|
86 |
+
{
|
87 |
+
"last_affected": "1.3.6"
|
88 |
+
}
|
89 |
+
]
|
90 |
+
}
|
91 |
+
]
|
92 |
+
},
|
93 |
+
{
|
94 |
+
"package": {
|
95 |
+
"ecosystem": "Maven",
|
96 |
+
"name": "net.hasor:cobble-lang"
|
97 |
+
},
|
98 |
+
"ranges": [
|
99 |
+
{
|
100 |
+
"type": "ECOSYSTEM",
|
101 |
+
"events": [
|
102 |
+
{
|
103 |
+
"introduced": "4.4.1"
|
104 |
+
},
|
105 |
+
{
|
106 |
+
"last_affected": "4.6.2"
|
107 |
+
}
|
108 |
+
]
|
109 |
+
}
|
110 |
+
]
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"package": {
|
114 |
+
"ecosystem": "Maven",
|
115 |
+
"name": "org.apache.commons:commons-io"
|
116 |
+
},
|
117 |
+
"versions": [
|
118 |
+
"1.3.2"
|
119 |
+
]
|
120 |
+
},
|
121 |
+
{
|
122 |
+
"package": {
|
123 |
+
"ecosystem": "Maven",
|
124 |
+
"name": "org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-io"
|
125 |
+
},
|
126 |
+
"ranges": [
|
127 |
+
{
|
128 |
+
"type": "ECOSYSTEM",
|
129 |
+
"events": [
|
130 |
+
{
|
131 |
+
"introduced": "1.4"
|
132 |
+
},
|
133 |
+
{
|
134 |
+
"last_affected": "1.5"
|
135 |
+
}
|
136 |
+
]
|
137 |
+
}
|
138 |
+
]
|
139 |
+
},
|
140 |
+
{
|
141 |
+
"package": {
|
142 |
+
"ecosystem": "Maven",
|
143 |
+
"name": "org.checkerframework.annotatedlib:commons-io"
|
144 |
+
},
|
145 |
+
"ranges": [
|
146 |
+
{
|
147 |
+
"type": "ECOSYSTEM",
|
148 |
+
"events": [
|
149 |
+
{
|
150 |
+
"introduced": "2.6"
|
151 |
+
},
|
152 |
+
{
|
153 |
+
"fixed": "2.7"
|
154 |
+
}
|
155 |
+
]
|
156 |
+
}
|
157 |
+
]
|
158 |
+
},
|
159 |
+
{
|
160 |
+
"package": {
|
161 |
+
"ecosystem": "Maven",
|
162 |
+
"name": "org.smartboot.servlet:servlet-core"
|
163 |
+
},
|
164 |
+
"ranges": [
|
165 |
+
{
|
166 |
+
"type": "ECOSYSTEM",
|
167 |
+
"events": [
|
168 |
+
{
|
169 |
+
"introduced": "0.1.9"
|
170 |
+
},
|
171 |
+
{
|
172 |
+
"last_affected": "0.6"
|
173 |
+
}
|
174 |
+
]
|
175 |
+
}
|
176 |
+
]
|
177 |
+
}
|
178 |
+
],
|
179 |
+
"references": [
|
180 |
+
{
|
181 |
+
"type": "ADVISORY",
|
182 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425"
|
183 |
+
},
|
184 |
+
{
|
185 |
+
"type": "WEB",
|
186 |
+
"url": "https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E"
|
187 |
+
},
|
188 |
+
{
|
189 |
+
"type": "WEB",
|
190 |
+
"url": "https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E"
|
191 |
+
},
|
192 |
+
{
|
193 |
+
"type": "WEB",
|
194 |
+
"url": "https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E"
|
195 |
+
},
|
196 |
+
{
|
197 |
+
"type": "WEB",
|
198 |
+
"url": "https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E"
|
199 |
+
},
|
200 |
+
{
|
201 |
+
"type": "WEB",
|
202 |
+
"url": "https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E"
|
203 |
+
},
|
204 |
+
{
|
205 |
+
"type": "WEB",
|
206 |
+
"url": "https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E"
|
207 |
+
},
|
208 |
+
{
|
209 |
+
"type": "WEB",
|
210 |
+
"url": "https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E"
|
211 |
+
},
|
212 |
+
{
|
213 |
+
"type": "WEB",
|
214 |
+
"url": "https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E"
|
215 |
+
},
|
216 |
+
{
|
217 |
+
"type": "WEB",
|
218 |
+
"url": "https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E"
|
219 |
+
},
|
220 |
+
{
|
221 |
+
"type": "WEB",
|
222 |
+
"url": "https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E"
|
223 |
+
},
|
224 |
+
{
|
225 |
+
"type": "WEB",
|
226 |
+
"url": "https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E"
|
227 |
+
},
|
228 |
+
{
|
229 |
+
"type": "WEB",
|
230 |
+
"url": "https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E"
|
231 |
+
},
|
232 |
+
{
|
233 |
+
"type": "WEB",
|
234 |
+
"url": "https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E"
|
235 |
+
},
|
236 |
+
{
|
237 |
+
"type": "WEB",
|
238 |
+
"url": "https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E"
|
239 |
+
},
|
240 |
+
{
|
241 |
+
"type": "WEB",
|
242 |
+
"url": "https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E"
|
243 |
+
},
|
244 |
+
{
|
245 |
+
"type": "WEB",
|
246 |
+
"url": "https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E"
|
247 |
+
},
|
248 |
+
{
|
249 |
+
"type": "WEB",
|
250 |
+
"url": "https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E"
|
251 |
+
},
|
252 |
+
{
|
253 |
+
"type": "WEB",
|
254 |
+
"url": "https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E"
|
255 |
+
},
|
256 |
+
{
|
257 |
+
"type": "WEB",
|
258 |
+
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html"
|
259 |
+
},
|
260 |
+
{
|
261 |
+
"type": "WEB",
|
262 |
+
"url": "https://security.netapp.com/advisory/ntap-20220210-0004"
|
263 |
+
},
|
264 |
+
{
|
265 |
+
"type": "WEB",
|
266 |
+
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
267 |
+
},
|
268 |
+
{
|
269 |
+
"type": "WEB",
|
270 |
+
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
271 |
+
},
|
272 |
+
{
|
273 |
+
"type": "WEB",
|
274 |
+
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
|
275 |
+
},
|
276 |
+
{
|
277 |
+
"type": "WEB",
|
278 |
+
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
279 |
+
},
|
280 |
+
{
|
281 |
+
"type": "WEB",
|
282 |
+
"url": "https://arxiv.org/pdf/2306.05534.pdf"
|
283 |
+
},
|
284 |
+
{
|
285 |
+
"type": "WEB",
|
286 |
+
"url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2021-29425"
|
287 |
+
},
|
288 |
+
{
|
289 |
+
"type": "WEB",
|
290 |
+
"url": "https://issues.apache.org/jira/browse/IO-556"
|
291 |
+
},
|
292 |
+
{
|
293 |
+
"type": "WEB",
|
294 |
+
"url": "https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E"
|
295 |
+
},
|
296 |
+
{
|
297 |
+
"type": "WEB",
|
298 |
+
"url": "https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E"
|
299 |
+
},
|
300 |
+
{
|
301 |
+
"type": "WEB",
|
302 |
+
"url": "https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E"
|
303 |
+
},
|
304 |
+
{
|
305 |
+
"type": "WEB",
|
306 |
+
"url": "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E"
|
307 |
+
},
|
308 |
+
{
|
309 |
+
"type": "WEB",
|
310 |
+
"url": "https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E"
|
311 |
+
},
|
312 |
+
{
|
313 |
+
"type": "WEB",
|
314 |
+
"url": "https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E"
|
315 |
+
},
|
316 |
+
{
|
317 |
+
"type": "WEB",
|
318 |
+
"url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"
|
319 |
+
},
|
320 |
+
{
|
321 |
+
"type": "WEB",
|
322 |
+
"url": "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E"
|
323 |
+
},
|
324 |
+
{
|
325 |
+
"type": "WEB",
|
326 |
+
"url": "https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E"
|
327 |
+
},
|
328 |
+
{
|
329 |
+
"type": "WEB",
|
330 |
+
"url": "https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E"
|
331 |
+
},
|
332 |
+
{
|
333 |
+
"type": "WEB",
|
334 |
+
"url": "https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E"
|
335 |
+
},
|
336 |
+
{
|
337 |
+
"type": "WEB",
|
338 |
+
"url": "https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E"
|
339 |
+
},
|
340 |
+
{
|
341 |
+
"type": "WEB",
|
342 |
+
"url": "https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E"
|
343 |
+
},
|
344 |
+
{
|
345 |
+
"type": "WEB",
|
346 |
+
"url": "https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E"
|
347 |
+
},
|
348 |
+
{
|
349 |
+
"type": "WEB",
|
350 |
+
"url": "https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E"
|
351 |
+
},
|
352 |
+
{
|
353 |
+
"type": "WEB",
|
354 |
+
"url": "https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E"
|
355 |
+
},
|
356 |
+
{
|
357 |
+
"type": "WEB",
|
358 |
+
"url": "https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E"
|
359 |
+
},
|
360 |
+
{
|
361 |
+
"type": "WEB",
|
362 |
+
"url": "https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E"
|
363 |
+
},
|
364 |
+
{
|
365 |
+
"type": "WEB",
|
366 |
+
"url": "https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E"
|
367 |
+
},
|
368 |
+
{
|
369 |
+
"type": "WEB",
|
370 |
+
"url": "https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E"
|
371 |
+
},
|
372 |
+
{
|
373 |
+
"type": "WEB",
|
374 |
+
"url": "https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E"
|
375 |
+
},
|
376 |
+
{
|
377 |
+
"type": "WEB",
|
378 |
+
"url": "https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E"
|
379 |
+
}
|
380 |
+
],
|
381 |
+
"database_specific": {
|
382 |
+
"cwe_ids": [
|
383 |
+
"CWE-20",
|
384 |
+
"CWE-22"
|
385 |
+
],
|
386 |
+
"severity": "MODERATE",
|
387 |
+
"github_reviewed": true,
|
388 |
+
"github_reviewed_at": "2021-04-26T15:21:31Z",
|
389 |
+
"nvd_published_at": "2021-04-13T07:15:00Z"
|
390 |
+
}
|
391 |
+
}
|
advisory/asf__commons-text_CVE-2022-42889_1.9.json
ADDED
@@ -0,0 +1,120 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-599f-7c49-w659",
|
4 |
+
"modified": "2022-10-17T17:34:05Z",
|
5 |
+
"published": "2022-10-13T19:00:17Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-42889"
|
8 |
+
],
|
9 |
+
"summary": "Arbitrary code execution in Apache Commons Text",
|
10 |
+
"details": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.commons:commons-text"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "1.5"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.10.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "com.guicedee.services:commons-text"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"last_affected": "1.2.2.1-jre17"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://arxiv.org/pdf/2306.05534"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "PACKAGE",
|
68 |
+
"url": "https://github.com/apache/commons-text"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "https://security.gentoo.org/glsa/202301-05"
|
81 |
+
},
|
82 |
+
{
|
83 |
+
"type": "WEB",
|
84 |
+
"url": "https://security.netapp.com/advisory/ntap-20221020-0004"
|
85 |
+
},
|
86 |
+
{
|
87 |
+
"type": "ADVISORY",
|
88 |
+
"url": "https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text"
|
89 |
+
},
|
90 |
+
{
|
91 |
+
"type": "WEB",
|
92 |
+
"url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html"
|
93 |
+
},
|
94 |
+
{
|
95 |
+
"type": "WEB",
|
96 |
+
"url": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html"
|
97 |
+
},
|
98 |
+
{
|
99 |
+
"type": "WEB",
|
100 |
+
"url": "http://seclists.org/fulldisclosure/2023/Feb/3"
|
101 |
+
},
|
102 |
+
{
|
103 |
+
"type": "WEB",
|
104 |
+
"url": "http://www.openwall.com/lists/oss-security/2022/10/13/4"
|
105 |
+
},
|
106 |
+
{
|
107 |
+
"type": "WEB",
|
108 |
+
"url": "http://www.openwall.com/lists/oss-security/2022/10/18/1"
|
109 |
+
}
|
110 |
+
],
|
111 |
+
"database_specific": {
|
112 |
+
"cwe_ids": [
|
113 |
+
"CWE-94"
|
114 |
+
],
|
115 |
+
"severity": "CRITICAL",
|
116 |
+
"github_reviewed": true,
|
117 |
+
"github_reviewed_at": "2022-10-13T20:22:17Z",
|
118 |
+
"nvd_published_at": "2022-10-13T13:15:00Z"
|
119 |
+
}
|
120 |
+
}
|
advisory/asf__cxf_CVE-2016-6812_3.0.11.json
ADDED
@@ -0,0 +1,134 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-vw2c-5wph-v92r",
|
4 |
+
"modified": "2023-12-21T22:53:21Z",
|
5 |
+
"published": "2022-05-13T01:09:20Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2016-6812"
|
8 |
+
],
|
9 |
+
"summary": "Improper Neutralization of Input During Web Page Generation in Apache CXF",
|
10 |
+
"details": "The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.cxf:cxf-core"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "3.0.12"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
],
|
36 |
+
"database_specific": {
|
37 |
+
"last_known_affected_version_range": "<= 3.0.11"
|
38 |
+
}
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"package": {
|
42 |
+
"ecosystem": "Maven",
|
43 |
+
"name": "org.apache.cxf:cxf-core"
|
44 |
+
},
|
45 |
+
"ranges": [
|
46 |
+
{
|
47 |
+
"type": "ECOSYSTEM",
|
48 |
+
"events": [
|
49 |
+
{
|
50 |
+
"introduced": "3.1.0"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"fixed": "3.1.9"
|
54 |
+
}
|
55 |
+
]
|
56 |
+
}
|
57 |
+
],
|
58 |
+
"database_specific": {
|
59 |
+
"last_known_affected_version_range": "<= 3.1.8"
|
60 |
+
}
|
61 |
+
}
|
62 |
+
],
|
63 |
+
"references": [
|
64 |
+
{
|
65 |
+
"type": "ADVISORY",
|
66 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6812"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"type": "WEB",
|
70 |
+
"url": "https://github.com/apache/cxf/commit/1be97cb13aef121b799b1be4d9793c0e8b925a12"
|
71 |
+
},
|
72 |
+
{
|
73 |
+
"type": "WEB",
|
74 |
+
"url": "https://github.com/apache/cxf/commit/1f824d8039c7a42a4aa46f844e6c800e1143c7e7"
|
75 |
+
},
|
76 |
+
{
|
77 |
+
"type": "WEB",
|
78 |
+
"url": "https://github.com/apache/cxf/commit/32e89366e2daa5670ac7a5c5c19f0bf9329a4c1e"
|
79 |
+
},
|
80 |
+
{
|
81 |
+
"type": "WEB",
|
82 |
+
"url": "https://github.com/apache/cxf/commit/a30397b0"
|
83 |
+
},
|
84 |
+
{
|
85 |
+
"type": "WEB",
|
86 |
+
"url": "https://access.redhat.com/errata/RHSA-2017:0868"
|
87 |
+
},
|
88 |
+
{
|
89 |
+
"type": "WEB",
|
90 |
+
"url": "https://github.com/apache/cxf"
|
91 |
+
},
|
92 |
+
{
|
93 |
+
"type": "WEB",
|
94 |
+
"url": "https://issues.apache.org/jira/browse/CXF-6216"
|
95 |
+
},
|
96 |
+
{
|
97 |
+
"type": "WEB",
|
98 |
+
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E"
|
99 |
+
},
|
100 |
+
{
|
101 |
+
"type": "WEB",
|
102 |
+
"url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E"
|
103 |
+
},
|
104 |
+
{
|
105 |
+
"type": "WEB",
|
106 |
+
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E"
|
107 |
+
},
|
108 |
+
{
|
109 |
+
"type": "WEB",
|
110 |
+
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"type": "WEB",
|
114 |
+
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
|
115 |
+
},
|
116 |
+
{
|
117 |
+
"type": "WEB",
|
118 |
+
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E"
|
119 |
+
},
|
120 |
+
{
|
121 |
+
"type": "WEB",
|
122 |
+
"url": "http://cxf.apache.org/security-advisories.data/CVE-2016-6812.txt.asc"
|
123 |
+
}
|
124 |
+
],
|
125 |
+
"database_specific": {
|
126 |
+
"cwe_ids": [
|
127 |
+
"CWE-79"
|
128 |
+
],
|
129 |
+
"severity": "MODERATE",
|
130 |
+
"github_reviewed": true,
|
131 |
+
"github_reviewed_at": "2022-07-06T19:46:03Z",
|
132 |
+
"nvd_published_at": "2017-08-10T16:29:00Z"
|
133 |
+
}
|
134 |
+
}
|
advisory/asf__cxf_CVE-2019-17573_3.2.11.json
ADDED
@@ -0,0 +1,170 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-f93p-f762-vr53",
|
4 |
+
"modified": "2021-06-15T17:28:04Z",
|
5 |
+
"published": "2020-06-10T20:02:33Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2019-17573"
|
8 |
+
],
|
9 |
+
"summary": "Reflected Cross-Site Scripting in Apache CXF",
|
10 |
+
"details": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.cxf:apache-cxf"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "3.2.12"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.cxf:apache-cxf"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "3.3.0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "3.3.5"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.apache.cxf:cxf"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "0"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "3.2.12"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"package": {
|
77 |
+
"ecosystem": "Maven",
|
78 |
+
"name": "org.apache.cxf:cxf"
|
79 |
+
},
|
80 |
+
"ranges": [
|
81 |
+
{
|
82 |
+
"type": "ECOSYSTEM",
|
83 |
+
"events": [
|
84 |
+
{
|
85 |
+
"introduced": "3.3.0"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"fixed": "3.3.5"
|
89 |
+
}
|
90 |
+
]
|
91 |
+
}
|
92 |
+
]
|
93 |
+
}
|
94 |
+
],
|
95 |
+
"references": [
|
96 |
+
{
|
97 |
+
"type": "ADVISORY",
|
98 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573"
|
99 |
+
},
|
100 |
+
{
|
101 |
+
"type": "WEB",
|
102 |
+
"url": "https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8"
|
103 |
+
},
|
104 |
+
{
|
105 |
+
"type": "WEB",
|
106 |
+
"url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E"
|
107 |
+
},
|
108 |
+
{
|
109 |
+
"type": "WEB",
|
110 |
+
"url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E"
|
111 |
+
},
|
112 |
+
{
|
113 |
+
"type": "WEB",
|
114 |
+
"url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E"
|
115 |
+
},
|
116 |
+
{
|
117 |
+
"type": "WEB",
|
118 |
+
"url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E"
|
119 |
+
},
|
120 |
+
{
|
121 |
+
"type": "WEB",
|
122 |
+
"url": "https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E"
|
123 |
+
},
|
124 |
+
{
|
125 |
+
"type": "WEB",
|
126 |
+
"url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E"
|
127 |
+
},
|
128 |
+
{
|
129 |
+
"type": "WEB",
|
130 |
+
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
|
131 |
+
},
|
132 |
+
{
|
133 |
+
"type": "WEB",
|
134 |
+
"url": "https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E"
|
135 |
+
},
|
136 |
+
{
|
137 |
+
"type": "WEB",
|
138 |
+
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
|
139 |
+
},
|
140 |
+
{
|
141 |
+
"type": "WEB",
|
142 |
+
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E"
|
143 |
+
},
|
144 |
+
{
|
145 |
+
"type": "WEB",
|
146 |
+
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
147 |
+
},
|
148 |
+
{
|
149 |
+
"type": "WEB",
|
150 |
+
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
|
151 |
+
},
|
152 |
+
{
|
153 |
+
"type": "WEB",
|
154 |
+
"url": "http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2"
|
155 |
+
},
|
156 |
+
{
|
157 |
+
"type": "WEB",
|
158 |
+
"url": "http://www.openwall.com/lists/oss-security/2020/11/12/2"
|
159 |
+
}
|
160 |
+
],
|
161 |
+
"database_specific": {
|
162 |
+
"cwe_ids": [
|
163 |
+
"CWE-79"
|
164 |
+
],
|
165 |
+
"severity": "MODERATE",
|
166 |
+
"github_reviewed": true,
|
167 |
+
"github_reviewed_at": "2020-06-09T19:27:28Z",
|
168 |
+
"nvd_published_at": "2020-01-16T18:15:00Z"
|
169 |
+
}
|
170 |
+
}
|
advisory/asf__james-project_CVE-2022-22931_3.6.0.json
ADDED
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-v84g-cf5j-xjqx",
|
4 |
+
"modified": "2022-02-08T20:38:52Z",
|
5 |
+
"published": "2022-02-08T00:00:34Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-22931"
|
8 |
+
],
|
9 |
+
"summary": "Path Traversal in Apache James Server",
|
10 |
+
"details": "Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).",
|
11 |
+
"severity": [
|
12 |
+
|
13 |
+
],
|
14 |
+
"affected": [
|
15 |
+
{
|
16 |
+
"package": {
|
17 |
+
"ecosystem": "Maven",
|
18 |
+
"name": "org.apache.james:james-server"
|
19 |
+
},
|
20 |
+
"ranges": [
|
21 |
+
{
|
22 |
+
"type": "ECOSYSTEM",
|
23 |
+
"events": [
|
24 |
+
{
|
25 |
+
"introduced": "0"
|
26 |
+
},
|
27 |
+
{
|
28 |
+
"fixed": "3.6.2"
|
29 |
+
}
|
30 |
+
]
|
31 |
+
}
|
32 |
+
]
|
33 |
+
}
|
34 |
+
],
|
35 |
+
"references": [
|
36 |
+
{
|
37 |
+
"type": "ADVISORY",
|
38 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22931"
|
39 |
+
},
|
40 |
+
{
|
41 |
+
"type": "WEB",
|
42 |
+
"url": "https://github.com/apache/james-project/pull/877"
|
43 |
+
},
|
44 |
+
{
|
45 |
+
"type": "WEB",
|
46 |
+
"url": "https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7"
|
47 |
+
},
|
48 |
+
{
|
49 |
+
"type": "PACKAGE",
|
50 |
+
"url": "https://github.com/apache/james-project"
|
51 |
+
},
|
52 |
+
{
|
53 |
+
"type": "WEB",
|
54 |
+
"url": "https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr"
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"type": "WEB",
|
58 |
+
"url": "https://www.openwall.com/lists/oss-security/2022/02/07/1"
|
59 |
+
}
|
60 |
+
],
|
61 |
+
"database_specific": {
|
62 |
+
"cwe_ids": [
|
63 |
+
"CWE-22"
|
64 |
+
],
|
65 |
+
"severity": "MODERATE",
|
66 |
+
"github_reviewed": true,
|
67 |
+
"github_reviewed_at": "2022-02-08T20:38:52Z",
|
68 |
+
"nvd_published_at": "2022-02-07T19:15:00Z"
|
69 |
+
}
|
70 |
+
}
|
advisory/asf__karaf_CVE-2022-22932_4.3.5.json
ADDED
@@ -0,0 +1,96 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-544x-2jx9-4pfg",
|
4 |
+
"modified": "2022-02-04T13:51:18Z",
|
5 |
+
"published": "2022-01-28T22:25:03Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2022-22932"
|
8 |
+
],
|
9 |
+
"summary": "Path traversal in Apache Karaf",
|
10 |
+
"details": "Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.karaf:apache-karaf"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "4.3.0"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "4.3.6"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.karaf:apache-karaf"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "4.2.15"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/apache/karaf/pull/1485"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "WEB",
|
72 |
+
"url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "PACKAGE",
|
76 |
+
"url": "https://github.com/apache/karaf"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "https://issues.apache.org/jira/browse/KARAF-7326"
|
81 |
+
},
|
82 |
+
{
|
83 |
+
"type": "WEB",
|
84 |
+
"url": "https://karaf.apache.org/security/cve-2022-22932.txt"
|
85 |
+
}
|
86 |
+
],
|
87 |
+
"database_specific": {
|
88 |
+
"cwe_ids": [
|
89 |
+
"CWE-22"
|
90 |
+
],
|
91 |
+
"severity": "MODERATE",
|
92 |
+
"github_reviewed": true,
|
93 |
+
"github_reviewed_at": "2022-01-27T23:10:36Z",
|
94 |
+
"nvd_published_at": "2022-01-26T11:15:00Z"
|
95 |
+
}
|
96 |
+
}
|
advisory/asf__nifi_CVE-2023-34468_1.21.0.json
ADDED
@@ -0,0 +1,108 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-xm2m-2q6h-22jw",
|
4 |
+
"modified": "2023-06-21T13:48:41Z",
|
5 |
+
"published": "2023-06-12T18:30:18Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-34468"
|
8 |
+
],
|
9 |
+
"summary": "Apache NiFi vulnerable to Code Injection",
|
10 |
+
"details": "The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.nifi:nifi-dbcp-base"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0.0.2"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.22.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.nifi:nifi-hikari-dbcp-service"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0.0.2"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "1.22.0"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
}
|
56 |
+
],
|
57 |
+
"references": [
|
58 |
+
{
|
59 |
+
"type": "ADVISORY",
|
60 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34468"
|
61 |
+
},
|
62 |
+
{
|
63 |
+
"type": "WEB",
|
64 |
+
"url": "https://github.com/apache/nifi/pull/7349"
|
65 |
+
},
|
66 |
+
{
|
67 |
+
"type": "WEB",
|
68 |
+
"url": "https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361"
|
69 |
+
},
|
70 |
+
{
|
71 |
+
"type": "PACKAGE",
|
72 |
+
"url": "https://github.com/apache/nifi"
|
73 |
+
},
|
74 |
+
{
|
75 |
+
"type": "WEB",
|
76 |
+
"url": "https://issues.apache.org/jira/browse/NIFI-11653"
|
77 |
+
},
|
78 |
+
{
|
79 |
+
"type": "WEB",
|
80 |
+
"url": "https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8"
|
81 |
+
},
|
82 |
+
{
|
83 |
+
"type": "WEB",
|
84 |
+
"url": "https://nifi.apache.org/security.html#CVE-2023-34468"
|
85 |
+
},
|
86 |
+
{
|
87 |
+
"type": "WEB",
|
88 |
+
"url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation"
|
89 |
+
},
|
90 |
+
{
|
91 |
+
"type": "WEB",
|
92 |
+
"url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html"
|
93 |
+
},
|
94 |
+
{
|
95 |
+
"type": "WEB",
|
96 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/06/12/3"
|
97 |
+
}
|
98 |
+
],
|
99 |
+
"database_specific": {
|
100 |
+
"cwe_ids": [
|
101 |
+
"CWE-94"
|
102 |
+
],
|
103 |
+
"severity": "HIGH",
|
104 |
+
"github_reviewed": true,
|
105 |
+
"github_reviewed_at": "2023-06-12T20:29:34Z",
|
106 |
+
"nvd_published_at": "2023-06-12T16:15:10Z"
|
107 |
+
}
|
108 |
+
}
|
advisory/asf__nifi_CVE-2023-36542_1.22.0.json
ADDED
@@ -0,0 +1,214 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"schema_version": "1.4.0",
|
3 |
+
"id": "GHSA-r969-8v3h-23v9",
|
4 |
+
"modified": "2023-08-03T21:41:04Z",
|
5 |
+
"published": "2023-07-29T09:30:15Z",
|
6 |
+
"aliases": [
|
7 |
+
"CVE-2023-36542"
|
8 |
+
],
|
9 |
+
"summary": "Apache NiFi Code Injection vulnerability",
|
10 |
+
"details": "Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.\n",
|
11 |
+
"severity": [
|
12 |
+
{
|
13 |
+
"type": "CVSS_V3",
|
14 |
+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
|
15 |
+
}
|
16 |
+
],
|
17 |
+
"affected": [
|
18 |
+
{
|
19 |
+
"package": {
|
20 |
+
"ecosystem": "Maven",
|
21 |
+
"name": "org.apache.nifi:nifi-cdc-mysql-bundle"
|
22 |
+
},
|
23 |
+
"ranges": [
|
24 |
+
{
|
25 |
+
"type": "ECOSYSTEM",
|
26 |
+
"events": [
|
27 |
+
{
|
28 |
+
"introduced": "0.0.2"
|
29 |
+
},
|
30 |
+
{
|
31 |
+
"fixed": "1.23.0"
|
32 |
+
}
|
33 |
+
]
|
34 |
+
}
|
35 |
+
]
|
36 |
+
},
|
37 |
+
{
|
38 |
+
"package": {
|
39 |
+
"ecosystem": "Maven",
|
40 |
+
"name": "org.apache.nifi:nifi-jms-processors"
|
41 |
+
},
|
42 |
+
"ranges": [
|
43 |
+
{
|
44 |
+
"type": "ECOSYSTEM",
|
45 |
+
"events": [
|
46 |
+
{
|
47 |
+
"introduced": "0.0.2"
|
48 |
+
},
|
49 |
+
{
|
50 |
+
"fixed": "1.23.0"
|
51 |
+
}
|
52 |
+
]
|
53 |
+
}
|
54 |
+
]
|
55 |
+
},
|
56 |
+
{
|
57 |
+
"package": {
|
58 |
+
"ecosystem": "Maven",
|
59 |
+
"name": "org.apache.nifi:nifi-standard-processors"
|
60 |
+
},
|
61 |
+
"ranges": [
|
62 |
+
{
|
63 |
+
"type": "ECOSYSTEM",
|
64 |
+
"events": [
|
65 |
+
{
|
66 |
+
"introduced": "0.0.2"
|
67 |
+
},
|
68 |
+
{
|
69 |
+
"fixed": "1.23.0"
|
70 |
+
}
|
71 |
+
]
|
72 |
+
}
|
73 |
+
]
|
74 |
+
},
|
75 |
+
{
|
76 |
+
"package": {
|
77 |
+
"ecosystem": "Maven",
|
78 |
+
"name": "org.apache.nifi:nifi-dbcp-service"
|
79 |
+
},
|
80 |
+
"ranges": [
|
81 |
+
{
|
82 |
+
"type": "ECOSYSTEM",
|
83 |
+
"events": [
|
84 |
+
{
|
85 |
+
"introduced": "0.0.2"
|
86 |
+
},
|
87 |
+
{
|
88 |
+
"fixed": "1.23.0"
|
89 |
+
}
|
90 |
+
]
|
91 |
+
}
|
92 |
+
]
|
93 |
+
},
|
94 |
+
{
|
95 |
+
"package": {
|
96 |
+
"ecosystem": "Maven",
|
97 |
+
"name": "org.apache.nifi:nifi-hikari-dbcp-service"
|
98 |
+
},
|
99 |
+
"ranges": [
|
100 |
+
{
|
101 |
+
"type": "ECOSYSTEM",
|
102 |
+
"events": [
|
103 |
+
{
|
104 |
+
"introduced": "0.0.2"
|
105 |
+
},
|
106 |
+
{
|
107 |
+
"fixed": "1.23.0"
|
108 |
+
}
|
109 |
+
]
|
110 |
+
}
|
111 |
+
]
|
112 |
+
},
|
113 |
+
{
|
114 |
+
"package": {
|
115 |
+
"ecosystem": "Maven",
|
116 |
+
"name": "org.apache.nifi:nifi-hadoop-dbcp-service"
|
117 |
+
},
|
118 |
+
"ranges": [
|
119 |
+
{
|
120 |
+
"type": "ECOSYSTEM",
|
121 |
+
"events": [
|
122 |
+
{
|
123 |
+
"introduced": "0.0.2"
|
124 |
+
},
|
125 |
+
{
|
126 |
+
"fixed": "1.23.0"
|
127 |
+
}
|
128 |
+
]
|
129 |
+
}
|
130 |
+
]
|
131 |
+
},
|
132 |
+
{
|
133 |
+
"package": {
|
134 |
+
"ecosystem": "Maven",
|
135 |
+
"name": "org.apache.nifi:nifi-hbase_2-client-service"
|
136 |
+
},
|
137 |
+
"ranges": [
|
138 |
+
{
|
139 |
+
"type": "ECOSYSTEM",
|
140 |
+
"events": [
|
141 |
+
{
|
142 |
+
"introduced": "0.0.2"
|
143 |
+
},
|
144 |
+
{
|
145 |
+
"fixed": "1.23.0"
|
146 |
+
}
|
147 |
+
]
|
148 |
+
}
|
149 |
+
]
|
150 |
+
},
|
151 |
+
{
|
152 |
+
"package": {
|
153 |
+
"ecosystem": "Maven",
|
154 |
+
"name": "org.apache.nifi:nifi-record-serialization-services"
|
155 |
+
},
|
156 |
+
"ranges": [
|
157 |
+
{
|
158 |
+
"type": "ECOSYSTEM",
|
159 |
+
"events": [
|
160 |
+
{
|
161 |
+
"introduced": "0.0.2"
|
162 |
+
},
|
163 |
+
{
|
164 |
+
"fixed": "1.23.0"
|
165 |
+
}
|
166 |
+
]
|
167 |
+
}
|
168 |
+
]
|
169 |
+
}
|
170 |
+
],
|
171 |
+
"references": [
|
172 |
+
{
|
173 |
+
"type": "ADVISORY",
|
174 |
+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36542"
|
175 |
+
},
|
176 |
+
{
|
177 |
+
"type": "WEB",
|
178 |
+
"url": "https://github.com/apache/nifi/commit/532578799c"
|
179 |
+
},
|
180 |
+
{
|
181 |
+
"type": "PACKAGE",
|
182 |
+
"url": "https://github.com/apache/nifi"
|
183 |
+
},
|
184 |
+
{
|
185 |
+
"type": "WEB",
|
186 |
+
"url": "https://issues.apache.org/jira/browse/NIFI-11744"
|
187 |
+
},
|
188 |
+
{
|
189 |
+
"type": "WEB",
|
190 |
+
"url": "https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof"
|
191 |
+
},
|
192 |
+
{
|
193 |
+
"type": "WEB",
|
194 |
+
"url": "https://nifi.apache.org/security.html#CVE-2023-36542"
|
195 |
+
},
|
196 |
+
{
|
197 |
+
"type": "WEB",
|
198 |
+
"url": "http://seclists.org/fulldisclosure/2023/Jul/43"
|
199 |
+
},
|
200 |
+
{
|
201 |
+
"type": "WEB",
|
202 |
+
"url": "http://www.openwall.com/lists/oss-security/2023/07/29/1"
|
203 |
+
}
|
204 |
+
],
|
205 |
+
"database_specific": {
|
206 |
+
"cwe_ids": [
|
207 |
+
"CWE-94"
|
208 |
+
],
|
209 |
+
"severity": "HIGH",
|
210 |
+
"github_reviewed": true,
|
211 |
+
"github_reviewed_at": "2023-07-31T22:03:10Z",
|
212 |
+
"nvd_published_at": "2023-07-29T08:15:48Z"
|
213 |
+
}
|
214 |
+
}
|