diff --git a/advisory/DSpace__DSpace_CVE-2016-10726_4.4.json b/advisory/DSpace__DSpace_CVE-2016-10726_4.4.json new file mode 100644 index 0000000000000000000000000000000000000000..eab0bdb5f6469ca818566676cf9208def6e686b2 --- /dev/null +++ b/advisory/DSpace__DSpace_CVE-2016-10726_4.4.json @@ -0,0 +1,107 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4m9r-5gqp-7j82", + "modified": "2021-06-11T14:37:55Z", + "published": "2018-10-19T16:52:06Z", + "aliases": [ + "CVE-2016-10726" + ], + "summary": "High severity vulnerability that affects org.dspace:dspace-xmlui", + "details": "The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-xmlui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0" + }, + { + "fixed": "4.5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-xmlui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0" + }, + { + "fixed": "5.5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-xmlui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82" + }, + { + "type": "WEB", + "url": "https://jira.duraspace.org/browse/DS-3094" + }, + { + "type": "WEB", + "url": "https://wiki.duraspace.org/display/DSDOC5x/Release+Notes" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T20:58:34Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/DSpace__DSpace_CVE-2022-31192_5.10.json b/advisory/DSpace__DSpace_CVE-2022-31192_5.10.json new file mode 100644 index 0000000000000000000000000000000000000000..ebb6e883d13e2fcda1ec847c24db10336399e3fb --- /dev/null +++ b/advisory/DSpace__DSpace_CVE-2022-31192_5.10.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4wm8-c2vv-xrpq", + "modified": "2022-08-06T05:46:27Z", + "published": "2022-08-06T05:46:27Z", + "aliases": [ + "CVE-2022-31192" + ], + "summary": "JSPUI Possible Cross Site Scripting in \"Request a Copy\" Feature", + "details": "### Impact\nThe JSPUI \"Request a Copy\" feature does not properly escape values submitted and stored from the \"Request a Copy\" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI.\n\n_This vulnerability does NOT impact the XMLUI or 7.x._\n\n### Patches\n\n_DSpace 6.x:_ \n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/503a6af57fd720c37b0d86c34de63baa5dd85819.patch (may be applied manually if an immediate upgrade to 6.4 is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\nAs a workaround, you can temporarily disable the \"Request a Copy\" feature by either commenting out the below configuration (or setting its value to empty):\n```\n# Comment out this default value\n# request.item.type = all\n```\nOnce your JSPUI site is patched, you can re-enable this setting. See https://wiki.lyrasis.org/display/DSDOC6x/Request+a+Copy for more information on this setting.\n\n### References\nDiscovered & reported by Andrea Bollini of 4Science\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at security@dspace.org\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-jspui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0" + }, + { + "fixed": "5.11" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-jspui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0" + }, + { + "fixed": "6.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31192" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/f7758457b7ec3489d525e39aa753cc70809d9ad9" + }, + { + "type": "PACKAGE", + "url": "https://github.com/DSpace/DSpace" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-08-06T05:46:27Z", + "nvd_published_at": "2022-08-01T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/DSpace__DSpace_CVE-2022-31194_5.10.json b/advisory/DSpace__DSpace_CVE-2022-31194_5.10.json new file mode 100644 index 0000000000000000000000000000000000000000..e04246d161e92f041f50286a726f5bdc676cefb5 --- /dev/null +++ b/advisory/DSpace__DSpace_CVE-2022-31194_5.10.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qp5m-c3m9-8q2p", + "modified": "2022-08-06T05:47:04Z", + "published": "2022-08-06T05:47:04Z", + "aliases": [ + "CVE-2022-31194" + ], + "summary": "JSPUI vulnerable to path traversal in submission (resumable) upload", + "details": "### Impact\nThe JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This path traversal can only be executed by a user with special privileges (submitter rights). This vulnerability only impacts the JSPUI.\n\n_This vulnerability does NOT impact the XMLUI or 7.x._\n\n### Patches\n\n_DSpace 6.x:_\n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24.patch (may be applied manually if an immediate upgrade to 6.4 or above is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\n\nThere are no known workarounds. However, this vulnerability cannot be exploited by an anonymous user or a basic user. The user must first have submitter privileges to at least one Collection and be able to determine how to modify the request parameters to exploit the vulnerability.\n\n### References\nDiscovered & reported by Johannes Moritz of Ripstech\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at security@dspace.org\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-jspui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0" + }, + { + "fixed": "5.11" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-jspui" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0" + }, + { + "fixed": "6.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31194" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/d1dd7d23329ef055069759df15cfa200c8e3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/DSpace/DSpace" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-08-06T05:47:04Z", + "nvd_published_at": "2022-08-01T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/DSpace__DSpace_CVE-2022-31195_5.10.json b/advisory/DSpace__DSpace_CVE-2022-31195_5.10.json new file mode 100644 index 0000000000000000000000000000000000000000..0025b4eaba8ad193640487d59fbcddcc66c2c64e --- /dev/null +++ b/advisory/DSpace__DSpace_CVE-2022-31195_5.10.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8rmh-55h4-93h5", + "modified": "2022-08-11T17:03:11Z", + "published": "2022-08-06T05:48:56Z", + "aliases": [ + "CVE-2022-31195" + ], + "summary": "DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import", + "details": "### Impact\nItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line.\n\n_This vulnerability does NOT impact 7.x._\n\n### Patches\n\n_DSpace 6.x:_ \n* Fixed in 6.4 via commit: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0\n* 6.x patch file: https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0.patch (may be applied manually if an immediate upgrade to 6.4 or 7.x is not possible)\n\n_DSpace 5.x:_\n* Fixed in 5.11 via commit: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199\n* 5.x patch file: https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199.patch (may be applied manually if an immediate upgrade to 5.11 or 6.4 or 7.x is not possible)\n\n#### Apply the patch to your DSpace\nIf at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:\n1. Download the appropriate patch file to the machine where DSpace is running\n2. From the `[dspace-src]` folder, apply the patch, e.g. `git apply [name-of-file].patch`\n3. Now, update your DSpace site (based loosely on the Upgrade instructions). This generally involves three steps:\n 1. Rebuild DSpace, e.g. `mvn -U clean package` (This will recompile all DSpace code)\n 2. Redeploy DSpace, e.g. `ant update` (This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.\n 3. Restart Tomcat\n\n### Workarounds\n\nAs a basic workaround, you may block all access to the following URL paths:\n* If you are using the XMLUI, block all access to `/admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path \"/xmlui\", then you'd need to block access to `/xmlui/admin/batchimport`.\n* If you are using the JSPUI, block all access to `/dspace-admin/batchimport` path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path \"/jspui\", then you'd need to block access to `/jspui/dspace-admin/batchimport`.\n\nKeep in mind, only an Administrative user or a user with command-line access to the server is able to import/upload SAF packages. Therefore, assuming those users do not blindly upload untrusted SAF packages, then it is unlikely your site could be impacted by this vulnerability.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at security@dspace.org\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-api" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0" + }, + { + "fixed": "5.11" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.dspace:dspace-api" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0" + }, + { + "fixed": "6.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-8rmh-55h4-93h5" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31195" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199" + }, + { + "type": "WEB", + "url": "https://github.com/DSpace/DSpace/commit/7af52a0883a9dbc475cf3001f04ed11b24c8a4c0" + }, + { + "type": "PACKAGE", + "url": "https://github.com/DSpace/DSpace" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-08-06T05:48:56Z", + "nvd_published_at": "2022-08-01T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json b/advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json new file mode 100644 index 0000000000000000000000000000000000000000..3e71aef8c6adf0382781de23255be4f74f79813f --- /dev/null +++ b/advisory/ESAPI__esapi-java-legacy_CVE-2022-23457_2.2.3.1.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8m5h-hrqm-pxm2", + "modified": "2022-04-27T21:09:43Z", + "published": "2022-04-27T21:09:43Z", + "aliases": [ + "CVE-2022-23457" + ], + "summary": "Path traversal in the OWASP Enterprise Security API", + "details": "### Impact\nThe default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.\n\n### Patches\nThis vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.\n\n### Workarounds\nYes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.esapi:esapi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.3.0.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.2.3.1" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23457" + }, + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ESAPI/esapi-java-legacy" + }, + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md" + }, + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20230127-0014" + }, + { + "type": "ADVISORY", + "url": "https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-04-27T21:09:43Z", + "nvd_published_at": "2022-04-25T20:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json b/advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json new file mode 100644 index 0000000000000000000000000000000000000000..43b19fd4c52798b0baa29d897616818cd8cea818 --- /dev/null +++ b/advisory/ESAPI__esapi-java-legacy_CVE-2022-24891_2.2.3.1.json @@ -0,0 +1,80 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q77q-vx4q-xx6q", + "modified": "2022-05-10T15:44:45Z", + "published": "2022-04-27T21:09:46Z", + "aliases": [ + "CVE-2022-24891" + ], + "summary": "Cross-site Scripting in org.owasp.esapi:esapi", + "details": "### Impact\nThere is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for \"onsiteURL\" in the **antisamy-esapi.xml** configuration file that can cause URLs with the \"javascript:\" scheme to NOT be sanitized. See the reference below for full details.\n\n### Patches\nPatched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.\n\n### Workarounds\nManually edit your **antisamy-esapi.xml** configuration files to change the \"onsiteURL\" regular expression as per remediation instructions in the reference below.\n\n### References\n[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.esapi:esapi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.3.0.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.2.3.1" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24891" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ESAPI/esapi-java-legacy" + }, + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf" + }, + { + "type": "WEB", + "url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20230127-0014" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-04-27T21:09:46Z", + "nvd_published_at": "2022-04-27T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json b/advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json new file mode 100644 index 0000000000000000000000000000000000000000..2b524b36e8bf052ab1ea873b2d97130cf55e19dc --- /dev/null +++ b/advisory/Graylog2__graylog2-server_CVE-2023-41044_5.1.2.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2q4p-f6gf-mqr5", + "modified": "2023-08-31T18:52:56Z", + "published": "2023-07-06T20:53:15Z", + "aliases": [ + "CVE-2023-41044" + ], + "summary": "Graylog server has partial path traversal vulnerability in Support Bundle feature", + "details": "A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.\n\nThanks to weiweiwei9811 for reporting this vulnerability and providing detailed information.\n\n### Impact\n\nGraylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory.\n\nThe default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `/support-bundle`.\n\nDue to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name.\n\nThe vulnerability would allow the download or deletion of files in the following example directories.\n\n- `/var/lib/graylog-server/support-bundle-test`\n- `/var/lib/graylog-server/support-bundlesdirectory`\n\nFor the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default.\n\n### Patches\n\nThe vulnerability is fixed in Graylog version 5.1.3 and later.\n\n### Workarounds\n\n\nBlock all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog.\n\n- `GET /api/system/debug/support/bundle/download/{filename}`\n- `DELETE /api/system/debug/support/bundle/{filename}`\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.graylog2:graylog2-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.1.0" + }, + { + "fixed": "5.1.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044" + }, + { + "type": "WEB", + "url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938" + }, + { + "type": "PACKAGE", + "url": "https://github.com/Graylog2/graylog2-server" + }, + { + "type": "WEB", + "url": "https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2023-07-06T20:53:15Z", + "nvd_published_at": "2023-08-31T18:15:09Z" + } +} \ No newline at end of file diff --git a/advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json b/advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json new file mode 100644 index 0000000000000000000000000000000000000000..1486d9e8ff29be0620328b3ba018519423f02803 --- /dev/null +++ b/advisory/OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g8jj-899q-8x3j", + "modified": "2021-05-13T19:52:04Z", + "published": "2022-02-10T23:04:13Z", + "aliases": [ + "CVE-2020-13973" + ], + "summary": "Cross-site scripting in json-sanitizer", + "details": "OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.mikesamuel:json-sanitizer" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973" + }, + { + "type": "WEB", + "url": "https://github.com/OWASP/json-sanitizer/pull/20" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-05-13T19:52:04Z", + "nvd_published_at": "2020-06-09T04:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json b/advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json new file mode 100644 index 0000000000000000000000000000000000000000..d47eecc3dd79a0798e4d9eb73149771ffd55d5e9 --- /dev/null +++ b/advisory/SpringSource__spring-security-oauth_CVE-2018-1260_2.3.2.RELEASE.json @@ -0,0 +1,130 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rrpm-pj7p-7j9q", + "modified": "2022-09-14T01:00:57Z", + "published": "2018-10-18T18:05:34Z", + "aliases": [ + "CVE-2018-1260" + ], + "summary": "Spring Security OAuth vulnerable to remote code execution (RCE)", + "details": "Spring Security OAuth versions prior to 2.3.3,prior to 2.2.2, prior to 2.1.2, and prior to 2.0.15 contain a remote code execution vulnerability. An attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint. ", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security.oauth:spring-security-oauth2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.3.0" + }, + { + "fixed": "2.3.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security.oauth:spring-security-oauth2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.2.0" + }, + { + "fixed": "2.2.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security.oauth:spring-security-oauth2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.1.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security.oauth:spring-security-oauth2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "fixed": "2.0.15" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1260" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1809" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:2939" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-rrpm-pj7p-7j9q" + }, + { + "type": "WEB", + "url": "https://pivotal.io/security/cve-2018-1260" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/104158" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:55:47Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json b/advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json new file mode 100644 index 0000000000000000000000000000000000000000..4f31a3c99e6b25bb0c46c71916b0f04e48b7ee2e --- /dev/null +++ b/advisory/alibaba__nacos_CVE-2021-44667_2.0.3.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4gr7-qw2q-jxh6", + "modified": "2022-03-22T21:37:08Z", + "published": "2022-03-12T00:00:27Z", + "aliases": [ + "CVE-2021-44667" + ], + "summary": "Cross-site Scripting in Nacos", + "details": "A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.alibaba.nacos:nacos-common" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.0.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44667" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/nacos/issues/7359" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5" + }, + { + "type": "PACKAGE", + "url": "https://github.com/alibaba/nacos" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-03-14T23:25:35Z", + "nvd_published_at": "2022-03-11T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json b/advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json new file mode 100644 index 0000000000000000000000000000000000000000..46a306789b9f6adf5054a40dd9f4ad2fce097118 --- /dev/null +++ b/advisory/alibaba__one-java-agent_CVE-2022-25842_0.0.1.json @@ -0,0 +1,78 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9hr3-j9mc-xmq2", + "modified": "2022-05-20T21:17:03Z", + "published": "2022-05-03T00:00:44Z", + "aliases": [ + "CVE-2022-25842" + ], + "summary": "Path Traversal in com.alibaba.oneagent:one-java-agent-plugin", + "details": "All versions of package `com.alibaba.oneagent:one-java-agent-plugin` are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. `../../evil.exe`). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.alibaba.oneagent:one-java-agent-plugin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25842" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/one-java-agent/pull/29" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/one-java-agent/pull/29/commits/359603b63fc6c59d8b57e061c171954bab3433bf" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/one-java-agent/pull/29/commits/b5b437f9f4c8cbfe7bdbe266e975a4bd513c13fe" + }, + { + "type": "PACKAGE", + "url": "https://github.com/alibaba/one-java-agent" + }, + { + "type": "WEB", + "url": "https://github.com/alibaba/one-java-agent/blob/1f399a2299a8a409d15ea6111a7098629b8f1050/one-java-agent-plugin/src/main/java/com/alibaba/oneagent/utils/IOUtils.java" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-29" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-05-20T21:17:03Z", + "nvd_published_at": "2022-05-01T16:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__activemq_CVE-2014-3576_5.10.2.json b/advisory/apache__activemq_CVE-2014-3576_5.10.2.json new file mode 100644 index 0000000000000000000000000000000000000000..ab6510671714a4e8928b96696f9e12973521b92c --- /dev/null +++ b/advisory/apache__activemq_CVE-2014-3576_5.10.2.json @@ -0,0 +1,93 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3wfj-vh84-732p", + "modified": "2023-12-20T19:05:58Z", + "published": "2022-05-14T01:14:52Z", + "aliases": [ + "CVE-2014-3576" + ], + "summary": "Improper Neutralization of Special Elements used in an OS Command in Apache ActiveMQ", + "details": "The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ before 5.11.0 allows remote attackers to cause a denial of service (shutdown) via a shutdown command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.activemq:activemq-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.11.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3576" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/00921f22ff9a8792d7663ef8fadd4823402a6324" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/f07e6a53216f9388185ac2b39f366f3bfd6a8a55" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/activemq" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://activemq.2283324.n4.nabble.com/About-CVE-2014-3576-tp4699628.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/134274/Apache-ActiveMQ-5.10.1-Denial-Of-Service.html" + }, + { + "type": "WEB", + "url": "http://www.debian.org/security/2015/dsa-3330" + }, + { + "type": "WEB", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" + }, + { + "type": "WEB", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/archive/1/536862/100/0/threaded" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-07-07T22:40:47Z", + "nvd_published_at": "2015-08-14T18:59:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__activemq_CVE-2019-0222_5.15.8.json b/advisory/apache__activemq_CVE-2019-0222_5.15.8.json new file mode 100644 index 0000000000000000000000000000000000000000..17c689aa732be1f57f0cfe2449081ff8117f7da1 --- /dev/null +++ b/advisory/apache__activemq_CVE-2019-0222_5.15.8.json @@ -0,0 +1,141 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jpv3-g4cc-6vfx", + "modified": "2024-03-14T22:09:43Z", + "published": "2019-04-02T15:46:42Z", + "aliases": [ + "CVE-2019-0222" + ], + "summary": "Improper Control of Generation of Code ('Code Injection') in org.apache.activemq:activemq-client", + "details": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.activemq:activemq-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0" + }, + { + "fixed": "5.15.9" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/98b9f2e" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/f78c0962ffb46fae3397eed6b7ec1e6e15045031" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20190404065432/http://www.securityfocus.com/bid/107622" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20190502-0006" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/activemq" + }, + { + "type": "WEB", + "url": "http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2019/03/27/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:44:05Z", + "nvd_published_at": "2019-03-28T22:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__activemq_CVE-2020-11998_5.15.12.json b/advisory/apache__activemq_CVE-2020-11998_5.15.12.json new file mode 100644 index 0000000000000000000000000000000000000000..1c52b7c2fab4422ba2d98ef050084deb31da6d4d --- /dev/null +++ b/advisory/apache__activemq_CVE-2020-11998_5.15.12.json @@ -0,0 +1,96 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wqfh-9m4g-7x6x", + "modified": "2024-03-14T21:56:27Z", + "published": "2022-02-09T22:14:58Z", + "aliases": [ + "CVE-2020-11998" + ], + "summary": "Remote code execution in Apache ActiveMQ", + "details": "A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.activemq:activemq-parent" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.15.12" + }, + { + "fixed": "5.15.13" + } + ] + } + ], + "versions": [ + "5.15.12" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11998" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/0d6e5f2" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/88b78d0" + }, + { + "type": "WEB", + "url": "https://github.com/apache/activemq/commit/aa8900c" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-04-05T23:02:39Z", + "nvd_published_at": "2020-09-10T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__camel_CVE-2018-8041_2.20.3.json b/advisory/apache__camel_CVE-2018-8041_2.20.3.json new file mode 100644 index 0000000000000000000000000000000000000000..45ee8be05d7d7491772194f9344a3ea827bd11d9 --- /dev/null +++ b/advisory/apache__camel_CVE-2018-8041_2.20.3.json @@ -0,0 +1,142 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jv74-f9pj-xp3f", + "modified": "2022-11-17T19:14:08Z", + "published": "2018-10-16T23:07:57Z", + "aliases": [ + "CVE-2018-8041" + ], + "summary": "Apache Camel's Mail is vulnerable to path traversal", + "details": "Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-mail" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.20.0" + }, + { + "fixed": "2.20.4" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-mail" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.21.0" + }, + { + "fixed": "2.21.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-mail" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.22.0" + }, + { + "fixed": "2.22.1" + } + ] + } + ], + "versions": [ + "2.22.0" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8041" + }, + { + "type": "WEB", + "url": "https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc" + }, + { + "type": "WEB", + "url": "https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3" + }, + { + "type": "WEB", + "url": "https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4" + }, + { + "type": "WEB", + "url": "https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:3768" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-jv74-f9pj-xp3f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/camel" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/CAMEL-12630" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/105352" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:44:10Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/apache__camel_CVE-2019-0194_2.21.4.json b/advisory/apache__camel_CVE-2019-0194_2.21.4.json new file mode 100644 index 0000000000000000000000000000000000000000..3e11504e69fa8192b6673563c41fbc1a3202e135 --- /dev/null +++ b/advisory/apache__camel_CVE-2019-0194_2.21.4.json @@ -0,0 +1,129 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4wjq-69rc-8wcp", + "modified": "2022-11-17T17:45:21Z", + "published": "2019-05-02T15:21:34Z", + "aliases": [ + "CVE-2019-0194" + ], + "summary": "Path Traversal in Apache Camel", + "details": "Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.21.0" + }, + { + "fixed": "2.21.5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.21.3" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.22.0" + }, + { + "fixed": "2.22.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.camel:camel-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.23.0" + }, + { + "fixed": "2.23.1" + } + ] + } + ], + "versions": [ + "2.23.0" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194" + }, + { + "type": "WEB", + "url": "https://github.com/apache/camel/pull/2700" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/camel" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/CAMEL-13042" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2019/04/30/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2019-05-02T15:00:07Z", + "nvd_published_at": "2019-04-30T22:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json b/advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json new file mode 100644 index 0000000000000000000000000000000000000000..5e7b9a5d092c8dee30f2e801e4187e7dec6211d4 --- /dev/null +++ b/advisory/apache__dolphinscheduler_CVE-2022-26884_2.0.5.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vpgf-fgm8-gxr2", + "modified": "2022-11-01T13:29:32Z", + "published": "2022-10-28T12:00:33Z", + "aliases": [ + "CVE-2022-26884" + ], + "summary": "Apache DolphinScheduler vulnerable to Path Traversal", + "details": "Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dolphinscheduler:dolphinscheduler" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.0.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26884" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/dolphinscheduler" + }, + { + "type": "WEB", + "url": "https://github.com/apache/dolphinscheduler/releases/tag/2.0.6" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jzrgmw2htyyb9c" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/10/28/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-10-31T19:37:13Z", + "nvd_published_at": "2022-10-28T08:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json b/advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json new file mode 100644 index 0000000000000000000000000000000000000000..c5030773f7a308b3fc0b8762d2d86aa8d77b70ba --- /dev/null +++ b/advisory/apache__dolphinscheduler_CVE-2022-34662_2.0.9.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fp35-xrrr-3gph", + "modified": "2022-11-02T21:45:12Z", + "published": "2022-11-01T19:00:29Z", + "aliases": [ + "CVE-2022-34662" + ], + "summary": "Apache DolphinScheduler vulnerable to Path Traversal", + "details": "When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dolphinscheduler:dolphinscheduler" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.0.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34662" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/dolphinscheduler" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-11-01T21:04:38Z", + "nvd_published_at": "2022-11-01T16:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json b/advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json new file mode 100644 index 0000000000000000000000000000000000000000..4e707c0d8967ff23904e5613bfe3c960691e4b26 --- /dev/null +++ b/advisory/apache__dolphinscheduler_CVE-2023-49109_3.2.0.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qwxx-xww6-8q8m", + "modified": "2024-02-21T00:17:58Z", + "published": "2024-02-20T12:30:58Z", + "aliases": [ + "CVE-2023-49109" + ], + "summary": "Remote Code Execution in Apache Dolphinscheduler", + "details": "This issue affects Apache DolphinScheduler 3.0.0 before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue. ", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dolphinscheduler:dolphinscheduler" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49109" + }, + { + "type": "WEB", + "url": "https://github.com/apache/dolphinscheduler/pull/14991" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/dolphinscheduler" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/5b6yq2gov0fsy9x5dkvo8ws4rr45vkn8" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/6kgsl93vtqlbdk6otttl0d8wmlspk0m5" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2024/02/20/4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2024-02-21T00:17:58Z", + "nvd_published_at": "2024-02-20T10:15:07Z" + } +} \ No newline at end of file diff --git a/advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json b/advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json new file mode 100644 index 0000000000000000000000000000000000000000..0f82447a416e0e277b915f4253526aa3bb581c50 --- /dev/null +++ b/advisory/apache__dolphinscheduler_CVE-2023-51770_3.2.0.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ff2w-wm48-jhqj", + "modified": "2024-02-21T00:21:46Z", + "published": "2024-02-20T12:31:00Z", + "aliases": [ + "CVE-2023-51770" + ], + "summary": "Arbitrary File Read Vulnerability in Apache Dolphinscheduler", + "details": "Arbitrary File Read Vulnerability in Apache Dolphinscheduler.\n\nThis issue affects Apache DolphinScheduler: before 3.2.1. \n\nWe recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dolphinscheduler:dolphinscheduler" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51770" + }, + { + "type": "WEB", + "url": "https://github.com/apache/dolphinscheduler/pull/15433" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/dolphinscheduler" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/4t8bdjqnfhldh73gy9p0whlgvnnbtn7g" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/gpks573kn00ofxn7n9gkg6o47d03p5rw" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2024/02/20/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2024-02-21T00:21:46Z", + "nvd_published_at": "2024-02-20T10:15:08Z" + } +} \ No newline at end of file diff --git a/advisory/apache__dubbo_CVE-2021-30180_2.7.9.json b/advisory/apache__dubbo_CVE-2021-30180_2.7.9.json new file mode 100644 index 0000000000000000000000000000000000000000..710c3bc8cb2639f6d82e69338786f60c6ba692ef --- /dev/null +++ b/advisory/apache__dubbo_CVE-2021-30180_2.7.9.json @@ -0,0 +1,58 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7wfc-x4f7-gg2x", + "modified": "2022-03-18T17:58:01Z", + "published": "2022-03-18T17:58:01Z", + "aliases": [ + "CVE-2021-30180" + ], + "summary": "Code injection in Apache Dubbo", + "details": "Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dubbo:dubbo" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.7.0" + }, + { + "fixed": "2.7.10" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-444", + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-06-02T20:19:48Z", + "nvd_published_at": "2021-06-01T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__flink_CVE-2020-17519_1.11.2.json b/advisory/apache__flink_CVE-2020-17519_1.11.2.json new file mode 100644 index 0000000000000000000000000000000000000000..750ad58b768afa3819e0d22f5f625a4028f4fb13 --- /dev/null +++ b/advisory/apache__flink_CVE-2020-17519_1.11.2.json @@ -0,0 +1,138 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-395w-qhqr-9fr6", + "modified": "2021-01-06T20:01:15Z", + "published": "2021-01-06T20:01:34Z", + "aliases": [ + "CVE-2020-17519" + ], + "summary": "Path Traversal in Apache Flink", + "details": "A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.flink:flink-runtime_2.11" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.11.0" + }, + { + "fixed": "1.11.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.flink:flink-runtime_2.12" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.11.0" + }, + { + "fixed": "1.11.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2021/01/05/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-552" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-01-06T20:01:15Z", + "nvd_published_at": "2021-01-05T12:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json b/advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json new file mode 100644 index 0000000000000000000000000000000000000000..1032ce75668a660222c0948fdf724e51f4435902 --- /dev/null +++ b/advisory/apache__incubator-dubbo_CVE-2021-30181_2.6.8.json @@ -0,0 +1,76 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qmfc-6www-fjqw", + "modified": "2022-03-18T17:57:04Z", + "published": "2022-03-18T17:57:04Z", + "aliases": [ + "CVE-2021-30181" + ], + "summary": "Code injection in Apache Dubbo", + "details": "Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.alibaba:dubbo" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.5.0" + }, + { + "fixed": "2.6.9" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.dubbo:dubbo" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.5.0" + }, + { + "fixed": "2.7.10" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30181" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-06-02T20:15:20Z", + "nvd_published_at": "2021-06-01T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json b/advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json new file mode 100644 index 0000000000000000000000000000000000000000..7cb248ca6f2d2b8007912bdfbdb2491cd3dd98a6 --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2019-0225_2.11.0.M2.json @@ -0,0 +1,92 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pffw-p2q5-w6vh", + "modified": "2022-09-17T00:13:09Z", + "published": "2019-04-08T16:23:36Z", + "aliases": [ + "CVE-2019-0225" + ], + "summary": "Improper Limitation of a Pathname ('Path Traversal') in org.apache.jspwiki:jspwiki-war", + "details": "A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M3" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M2" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0225" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-pffw-p2q5-w6vh" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2019/03/26/2" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/107627" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:49:01Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json b/advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json new file mode 100644 index 0000000000000000000000000000000000000000..357340e7569480c2922cf025f794390a2ed789cb --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2019-10076_2.11.0.M3.json @@ -0,0 +1,94 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cxx2-fp39-rf3r", + "modified": "2021-08-04T19:53:10Z", + "published": "2019-06-06T15:29:22Z", + "aliases": [ + "CVE-2019-10076" + ], + "summary": "Cross-Site Scripting in JSPWiki", + "details": "A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10076" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2019/05/19/4" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/108437" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2019-05-29T19:05:23Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json b/advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json new file mode 100644 index 0000000000000000000000000000000000000000..9015434f9c98cfdd80927177f71272ef3f71fa09 --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2019-10077_2.11.0.M3.json @@ -0,0 +1,82 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cj6j-32rg-45r2", + "modified": "2021-08-04T19:54:08Z", + "published": "2019-06-06T15:29:25Z", + "aliases": [ + "CVE-2019-10077" + ], + "summary": "Cross-site Scripting in JSPWiki", + "details": "A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10077" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2019-05-29T19:05:35Z", + "nvd_published_at": "2019-05-20T21:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json b/advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json new file mode 100644 index 0000000000000000000000000000000000000000..c31a300d092812d389b20e147dfbbf98f5bfaff2 --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2019-10078_2.11.0.M3.json @@ -0,0 +1,82 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hp5r-mhgp-56c9", + "modified": "2021-08-04T20:00:07Z", + "published": "2019-06-06T15:29:29Z", + "aliases": [ + "CVE-2019-10078" + ], + "summary": "Cross-site Scriptin in JSPWiki", + "details": "A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M3" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10078" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2019-05-29T19:05:49Z", + "nvd_published_at": "2019-05-20T21:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json b/advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json new file mode 100644 index 0000000000000000000000000000000000000000..6519457bcf5e26a86280b8cad7cfebf57cbb479f --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2019-10089_2.11.0.M4.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3rx2-x6mx-grj3", + "modified": "2021-08-17T22:35:54Z", + "published": "2019-10-11T18:41:54Z", + "aliases": [ + "CVE-2019-10089" + ], + "summary": "Cross-site scripting in Apache JSPWiki", + "details": "On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.9.0" + }, + { + "fixed": "2.11.0.M5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.11.0.M4" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10089" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2019-09-25T12:33:32Z", + "nvd_published_at": "2019-09-23T15:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json b/advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json new file mode 100644 index 0000000000000000000000000000000000000000..03a3049d9280057fb4bec491c570791ad97e4e35 --- /dev/null +++ b/advisory/apache__jspwiki_CVE-2022-46907_2.11.3.json @@ -0,0 +1,120 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qvq8-cw7f-m7m4", + "modified": "2023-06-03T00:39:55Z", + "published": "2023-05-25T09:30:25Z", + "aliases": [ + "CVE-2022-46907" + ], + "summary": "Apache JSPWiki vulnerable to cross-site scripting on several plugins", + "details": "A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-main" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.12.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.jspwiki:jspwiki-war" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.12.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46907" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/0b9a0149032170063f22d65e335dfd317db815ea" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/46e1ef7a595ca5cabf5ef184139910413f2024fc" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/484c6a133e397693991b7c9a9b62ef3ca48ce707" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/75019d337f1d0033b1f65428e75f43baeffd99dd" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/82be08904a6d8bd22fa2d4e5a7e85f43408724d3" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/9d6dbf911d52d724297e4e46c4b80649fb028ff9" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/commit/df20770f251a8d7431047e556b144ef24ee6a3a7" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/jspwiki" + }, + { + "type": "WEB", + "url": "https://github.com/apache/jspwiki/blob/37bf55373ed5a739a388a720163cf51d1104537f/ChangeLog.md?plain=1#L112" + }, + { + "type": "WEB", + "url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-46907" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/05/25/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-05-25T17:38:08Z", + "nvd_published_at": "2023-05-25T07:15:08Z" + } +} \ No newline at end of file diff --git a/advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json b/advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json new file mode 100644 index 0000000000000000000000000000000000000000..b51150a09abefaf371d9b8d187e127ca5041a6a7 --- /dev/null +++ b/advisory/apache__mina-sshd_CVE-2023-35887_2.9.2.json @@ -0,0 +1,120 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mjmq-gwgm-5qhm", + "modified": "2023-12-07T18:20:03Z", + "published": "2023-07-10T18:30:49Z", + "aliases": [ + "CVE-2023-35887" + ], + "summary": "Apache MINA SSHD information disclosure vulnerability", + "details": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.\n\nIn SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover \"exists/does not exist\" information about items outside the rooted tree via paths including parent navigation (\"..\") beyond the root, or involving symlinks.\n\nThis issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3\n\nUntil version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sshd:sshd-common" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.9.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sshd:sshd-sftp" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "2.9.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sshd:sshd-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "2.1.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887" + }, + { + "type": "WEB", + "url": "https://github.com/apache/mina-sshd/pull/362" + }, + { + "type": "WEB", + "url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0" + }, + { + "type": "WEB", + "url": "https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0" + }, + { + "type": "WEB", + "url": "https://github.com/apache/mina-sshd/commit/c20739b43aab0f7bf2ccad982a6cb37b9d5a8a0b" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/mina-sshd" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/SSHD-1324" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200", + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-07-10T21:53:01Z", + "nvd_published_at": "2023-07-10T16:15:53Z" + } +} \ No newline at end of file diff --git a/advisory/apache__myfaces_CVE-2011-4367_2.0.11.json b/advisory/apache__myfaces_CVE-2011-4367_2.0.11.json new file mode 100644 index 0000000000000000000000000000000000000000..bd41265c6c156380d12fa36394e9b99745c184e6 --- /dev/null +++ b/advisory/apache__myfaces_CVE-2011-4367_2.0.11.json @@ -0,0 +1,85 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gjfx-9wx3-j6r7", + "modified": "2023-08-16T23:00:39Z", + "published": "2022-05-13T01:24:34Z", + "aliases": [ + "CVE-2011-4367" + ], + "summary": "Apache MyFaces Vulnerable to Path Traversal", + "details": "Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a `..` (dot dot) in the (1) ln parameter to `faces/javax.faces.resource/web.xml` or (2) the `PATH_INFO` to `faces/javax.faces.resource/`.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.myfaces.core:myfaces-impl" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "fixed": "2.0.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.myfaces.core:myfaces-impl" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.1.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4367" + }, + { + "type": "WEB", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73100" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20120213042504/http://www.securityfocus.com/bid/51939" + }, + { + "type": "WEB", + "url": "http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E" + }, + { + "type": "WEB", + "url": "http://seclists.org/fulldisclosure/2012/Feb/150" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-11-02T00:42:02Z", + "nvd_published_at": "2014-06-19T14:55:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__nifi_CVE-2022-33140_1.16.2.json b/advisory/apache__nifi_CVE-2022-33140_1.16.2.json new file mode 100644 index 0000000000000000000000000000000000000000..da5ebc2f0cf2afee1f3cc064dc6681527444909f --- /dev/null +++ b/advisory/apache__nifi_CVE-2022-33140_1.16.2.json @@ -0,0 +1,85 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-77hf-23pq-2g7c", + "modified": "2022-11-03T22:19:38Z", + "published": "2022-06-16T00:00:26Z", + "aliases": [ + "CVE-2022-33140" + ], + "summary": "Code injection in Apache NiFi and NiFi Registry", + "details": "The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi.registry:nifi-registry-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.6.0" + }, + { + "fixed": "1.16.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.10.0" + }, + { + "fixed": "1.16.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33140" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/nifi" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr" + }, + { + "type": "WEB", + "url": "https://nifi.apache.org/security.html#CVE-2022-33140" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74", + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-17T21:49:10Z", + "nvd_published_at": "2022-06-15T15:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json b/advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json new file mode 100644 index 0000000000000000000000000000000000000000..eb57b4668987aba275c7031f4b7f5bce91daab5b --- /dev/null +++ b/advisory/apache__rocketmq_CVE-2019-17572_4.6.0.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5x3v-2gxr-59m2", + "modified": "2021-04-07T19:55:55Z", + "published": "2020-07-01T17:26:15Z", + "aliases": [ + "CVE-2019-17572" + ], + "summary": "Directory traversal in Apache RocketMQ", + "details": "In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-broker" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.2.0" + }, + { + "fixed": "4.6.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17572" + }, + { + "type": "WEB", + "url": "https://github.com/apache/rocketmq/issues/1637" + }, + { + "type": "WEB", + "url": "https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://seclists.org/oss-sec/2020/q2/112" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-07-01T17:26:05Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json b/advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json new file mode 100644 index 0000000000000000000000000000000000000000..7e79fa19812d45f9e6598a685f2460753240b8f4 --- /dev/null +++ b/advisory/apache__rocketmq_CVE-2023-33246_5.1.0.json @@ -0,0 +1,134 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x3cq-8f32-5f63", + "modified": "2023-07-12T14:46:52Z", + "published": "2023-07-06T21:15:04Z", + "aliases": [ + "CVE-2023-33246" + ], + "summary": "Apache RocketMQ may have remote code execution vulnerability when using update configuration function", + "details": "For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. \n\nSeveral components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. \n\nTo prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-broker" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0" + }, + { + "fixed": "5.1.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-namesrv" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0.0" + }, + { + "fixed": "4.9.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-controller" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0" + }, + { + "fixed": "5.1.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-namesrv" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0" + }, + { + "fixed": "5.1.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246" + }, + { + "type": "WEB", + "url": "https://github.com/apache/rocketmq/commit/9d411cf04a695e7a3f41036e8377b0aa544d754d" + }, + { + "type": "WEB", + "url": "https://github.com/apache/rocketmq/commit/c3ada731405c5990c36bf58d50b3e61965300703" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/rocketmq" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/07/12/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2023-07-06T23:48:22Z", + "nvd_published_at": "2023-05-24T15:15:09Z" + } +} \ No newline at end of file diff --git a/advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json b/advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json new file mode 100644 index 0000000000000000000000000000000000000000..3cd78b2a994492a2e62ca6507007bcaab9eb5d5b --- /dev/null +++ b/advisory/apache__rocketmq_CVE-2023-37582_4.9.6.json @@ -0,0 +1,84 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gpq8-963w-8qc9", + "modified": "2023-07-20T14:54:54Z", + "published": "2023-07-12T12:31:36Z", + "aliases": [ + "CVE-2023-37582" + ], + "summary": "RocketMQ NameServer component Code Injection vulnerability", + "details": "The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. \n\nWhen NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. \n\nIt is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-namesrv" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.9.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.rocketmq:rocketmq-namesrv" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0" + }, + { + "fixed": "5.1.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/rocketmq" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/07/12/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2023-07-12T17:30:39Z", + "nvd_published_at": "2023-07-12T10:15:11Z" + } +} \ No newline at end of file diff --git a/advisory/apache__shiro_CVE-2023-34478_1.11.0.json b/advisory/apache__shiro_CVE-2023-34478_1.11.0.json new file mode 100644 index 0000000000000000000000000000000000000000..897fd6235785685d72f07dfbb9db806dd7247329 --- /dev/null +++ b/advisory/apache__shiro_CVE-2023-34478_1.11.0.json @@ -0,0 +1,92 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pmhc-2g4f-85cg", + "modified": "2023-09-15T18:29:37Z", + "published": "2023-07-24T21:30:39Z", + "aliases": [ + "CVE-2023-34478" + ], + "summary": "Path Traversal in Apache Shiro", + "details": "Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.\n\nMitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.shiro:shiro-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.12.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.shiro:shiro-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0-alpha-1" + }, + { + "fixed": "2.0.0-alpha-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34478" + }, + { + "type": "WEB", + "url": "https://github.com/apache/shiro/commit/c3ede3f94efb442acb0795714a022c2c121d1da0" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/shiro" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20230915-0005" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/07/24/4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2023-07-25T13:51:45Z", + "nvd_published_at": "2023-07-24T19:15:10Z" + } +} \ No newline at end of file diff --git a/advisory/apache__shiro_CVE-2023-46749_1.12.0.json b/advisory/apache__shiro_CVE-2023-46749_1.12.0.json new file mode 100644 index 0000000000000000000000000000000000000000..4b3f5c9e597b0e796837110c4cd49f15d9a42b03 --- /dev/null +++ b/advisory/apache__shiro_CVE-2023-46749_1.12.0.json @@ -0,0 +1,79 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jc7h-c423-mpjc", + "modified": "2024-01-22T21:32:36Z", + "published": "2024-01-15T12:30:19Z", + "aliases": [ + "CVE-2023-46749" + ], + "summary": "Apache Shiro vulnerable to path traversal", + "details": "Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting \n\nMitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.shiro:shiro-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.13.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.shiro:shiro-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0alpha1" + }, + { + "fixed": "2.0.0-alpha4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "< 2.0.0alpha4" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2024-01-16T20:34:50Z", + "nvd_published_at": "2024-01-15T10:15:26Z" + } +} \ No newline at end of file diff --git a/advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json b/advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json new file mode 100644 index 0000000000000000000000000000000000000000..5efa82d44678740099b020076f0babc7005ab89f --- /dev/null +++ b/advisory/apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2.10.0.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h2rq-qhr7-53gm", + "modified": "2024-02-14T14:52:14Z", + "published": "2024-02-06T12:30:30Z", + "aliases": [ + "CVE-2024-23673" + ], + "summary": "Apache Sling Servlets Resolver executes malicious code via path traversal", + "details": "\nMalicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script. \n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sling:org.apache.sling.servlets.resolver" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.11.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673" + }, + { + "type": "WEB", + "url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2024/02/06/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2024-02-06T18:24:31Z", + "nvd_published_at": "2024-02-06T10:15:08Z" + } +} \ No newline at end of file diff --git a/advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json b/advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json new file mode 100644 index 0000000000000000000000000000000000000000..14e62665d57c3c6eca69654e640b4dace70770cc --- /dev/null +++ b/advisory/apache__sling-org-apache-sling-xss_CVE-2016-5394_1.0.8.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xwf4-88xr-hx2j", + "modified": "2022-11-03T19:12:07Z", + "published": "2022-05-13T01:25:29Z", + "aliases": [ + "CVE-2016-5394" + ], + "summary": "Cross site scripting in Apache Sling", + "details": "In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sling:org.apache.sling.xss" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.sling:org.apache.sling.xss.compat" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.1.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5394" + }, + { + "type": "WEB", + "url": "https://github.com/apache/sling-org-apache-sling-xss/commit/de32b144ad2be3367559f6184d560db42a220529" + }, + { + "type": "WEB", + "url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2016-5394" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/332166037a54b97cf41e2b616aaed38439de94b19b204841478e4525@%3Cdev.sling.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/99870" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-11-03T19:12:07Z", + "nvd_published_at": "2017-07-19T15:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__struts_CVE-2020-17530_2.5.25.json b/advisory/apache__struts_CVE-2020-17530_2.5.25.json new file mode 100644 index 0000000000000000000000000000000000000000..63aaaa247224a138852e0f81fe06cf357fe113a3 --- /dev/null +++ b/advisory/apache__struts_CVE-2020-17530_2.5.25.json @@ -0,0 +1,98 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jc35-q369-45pv", + "modified": "2022-02-08T22:01:20Z", + "published": "2022-02-09T22:51:56Z", + "aliases": [ + "CVE-2020-17530" + ], + "summary": "Remote code execution in Apache Struts", + "details": "Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.struts:struts2-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "fixed": "2.5.26" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530" + }, + { + "type": "WEB", + "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20210115-0005" + }, + { + "type": "WEB", + "url": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "http://jvn.jp/en/jp/JVN43969166/index.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-917", + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-04-09T21:42:05Z", + "nvd_published_at": "2020-12-11T02:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/apache__tika_CVE-2018-11762_1.18.json b/advisory/apache__tika_CVE-2018-11762_1.18.json new file mode 100644 index 0000000000000000000000000000000000000000..1a47d8a6238c354610c5e0cab70f7d950e837cd3 --- /dev/null +++ b/advisory/apache__tika_CVE-2018-11762_1.18.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6g3-v46q-5p28", + "modified": "2021-09-21T17:58:38Z", + "published": "2018-10-17T15:49:58Z", + "aliases": [ + "CVE-2018-11762" + ], + "summary": "Moderate severity vulnerability that affects org.apache.tika:tika-core", + "details": "In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as \"C:/evil.bat\", tika-app would overwrite that file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.tika:tika-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.9" + }, + { + "fixed": "1.19" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11762" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-w6g3-v46q-5p28" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/105515" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:59:47Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json b/advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json new file mode 100644 index 0000000000000000000000000000000000000000..8df89812f4863fd01715880110921bcb41a55fd1 --- /dev/null +++ b/advisory/apache__uima-uimaj_CVE-2022-32287_3.3.0.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xgqr-5wqw-9fpv", + "modified": "2022-11-04T20:44:39Z", + "published": "2022-11-03T19:00:26Z", + "aliases": [ + "CVE-2022-32287" + ], + "summary": "Apache UIMA Path Traversal vulnerability", + "details": "A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.uima:uimaj-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.3.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32287" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935yv1shdd" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/11/03/4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-11-03T21:11:17Z", + "nvd_published_at": "2022-11-03T12:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__commons-io_CVE-2021-29425_2.6.json b/advisory/asf__commons-io_CVE-2021-29425_2.6.json new file mode 100644 index 0000000000000000000000000000000000000000..a28954136ee68f2e1736ed8ae345b169fa55597e --- /dev/null +++ b/advisory/asf__commons-io_CVE-2021-29425_2.6.json @@ -0,0 +1,391 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwrp-pvrq-jmwv", + "modified": "2024-02-14T20:25:59Z", + "published": "2021-04-26T16:04:00Z", + "aliases": [ + "CVE-2021-29425" + ], + "summary": "Path Traversal and Improper Input Validation in Apache Commons IO", + "details": "In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "commons-io:commons-io" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.cosium.vet:vet" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0" + }, + { + "last_affected": "3.22" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.diamondq.common:common-thirdparty.jcasbin" + }, + "versions": [ + "1.4.0" + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.liferay:com.liferay.sass.compiler.jsass" + }, + "versions": [ + "1.0.1" + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.virjar:ratel-api" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "last_affected": "1.3.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "net.hasor:cobble-lang" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.4.1" + }, + { + "last_affected": "4.6.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.commons:commons-io" + }, + "versions": [ + "1.3.2" + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-io" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.4" + }, + { + "last_affected": "1.5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.checkerframework.annotatedlib:commons-io" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.6" + }, + { + "fixed": "2.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.smartboot.servlet:servlet-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.1.9" + }, + { + "last_affected": "0.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20220210-0004" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://arxiv.org/pdf/2306.05534.pdf" + }, + { + "type": "WEB", + "url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2021-29425" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/IO-556" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20", + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-04-26T15:21:31Z", + "nvd_published_at": "2021-04-13T07:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__commons-text_CVE-2022-42889_1.9.json b/advisory/asf__commons-text_CVE-2022-42889_1.9.json new file mode 100644 index 0000000000000000000000000000000000000000..92592df9b1e9286ff37b498e17be615759895de0 --- /dev/null +++ b/advisory/asf__commons-text_CVE-2022-42889_1.9.json @@ -0,0 +1,120 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-599f-7c49-w659", + "modified": "2022-10-17T17:34:05Z", + "published": "2022-10-13T19:00:17Z", + "aliases": [ + "CVE-2022-42889" + ], + "summary": "Arbitrary code execution in Apache Commons Text", + "details": "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.commons:commons-text" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.5" + }, + { + "fixed": "1.10.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.guicedee.services:commons-text" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "1.2.2.1-jre17" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42889" + }, + { + "type": "WEB", + "url": "https://arxiv.org/pdf/2306.05534" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/commons-text" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022" + }, + { + "type": "WEB", + "url": "https://security.gentoo.org/glsa/202301-05" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20221020-0004" + }, + { + "type": "ADVISORY", + "url": "https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html" + }, + { + "type": "WEB", + "url": "http://seclists.org/fulldisclosure/2023/Feb/3" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/10/13/4" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/10/18/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-10-13T20:22:17Z", + "nvd_published_at": "2022-10-13T13:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__cxf_CVE-2016-6812_3.0.11.json b/advisory/asf__cxf_CVE-2016-6812_3.0.11.json new file mode 100644 index 0000000000000000000000000000000000000000..9e9be5a976b6807a522d46e8b9811e50ba89295f --- /dev/null +++ b/advisory/asf__cxf_CVE-2016-6812_3.0.11.json @@ -0,0 +1,134 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vw2c-5wph-v92r", + "modified": "2023-12-21T22:53:21Z", + "published": "2022-05-13T01:09:20Z", + "aliases": [ + "CVE-2016-6812" + ], + "summary": "Improper Neutralization of Input During Web Page Generation in Apache CXF", + "details": "The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:cxf-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.0.12" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.0.11" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:cxf-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.1.0" + }, + { + "fixed": "3.1.9" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.1.8" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6812" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf/commit/1be97cb13aef121b799b1be4d9793c0e8b925a12" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf/commit/1f824d8039c7a42a4aa46f844e6c800e1143c7e7" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf/commit/32e89366e2daa5670ac7a5c5c19f0bf9329a4c1e" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf/commit/a30397b0" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2017:0868" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/CXF-6216" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "http://cxf.apache.org/security-advisories.data/CVE-2016-6812.txt.asc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-07-06T19:46:03Z", + "nvd_published_at": "2017-08-10T16:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__cxf_CVE-2019-17573_3.2.11.json b/advisory/asf__cxf_CVE-2019-17573_3.2.11.json new file mode 100644 index 0000000000000000000000000000000000000000..c7d12002c7d5ce541a7e593c41aa70f115946609 --- /dev/null +++ b/advisory/asf__cxf_CVE-2019-17573_3.2.11.json @@ -0,0 +1,170 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f93p-f762-vr53", + "modified": "2021-06-15T17:28:04Z", + "published": "2020-06-10T20:02:33Z", + "aliases": [ + "CVE-2019-17573" + ], + "summary": "Reflected Cross-Site Scripting in Apache CXF", + "details": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:apache-cxf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.2.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:apache-cxf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.0" + }, + { + "fixed": "3.3.5" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:cxf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.2.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.cxf:cxf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.3.0" + }, + { + "fixed": "3.3.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" + }, + { + "type": "WEB", + "url": "https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" + }, + { + "type": "WEB", + "url": "http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2020/11/12/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-09T19:27:28Z", + "nvd_published_at": "2020-01-16T18:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__james-project_CVE-2022-22931_3.6.0.json b/advisory/asf__james-project_CVE-2022-22931_3.6.0.json new file mode 100644 index 0000000000000000000000000000000000000000..561f5f9fc1e0e59dec05f5e674c040f50f571093 --- /dev/null +++ b/advisory/asf__james-project_CVE-2022-22931_3.6.0.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v84g-cf5j-xjqx", + "modified": "2022-02-08T20:38:52Z", + "published": "2022-02-08T00:00:34Z", + "aliases": [ + "CVE-2022-22931" + ], + "summary": "Path Traversal in Apache James Server", + "details": "Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.james:james-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.6.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22931" + }, + { + "type": "WEB", + "url": "https://github.com/apache/james-project/pull/877" + }, + { + "type": "WEB", + "url": "https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/james-project" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr" + }, + { + "type": "WEB", + "url": "https://www.openwall.com/lists/oss-security/2022/02/07/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-02-08T20:38:52Z", + "nvd_published_at": "2022-02-07T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__karaf_CVE-2022-22932_4.3.5.json b/advisory/asf__karaf_CVE-2022-22932_4.3.5.json new file mode 100644 index 0000000000000000000000000000000000000000..934bd19317cd681437f76ee622a14f48448faa4b --- /dev/null +++ b/advisory/asf__karaf_CVE-2022-22932_4.3.5.json @@ -0,0 +1,96 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-544x-2jx9-4pfg", + "modified": "2022-02-04T13:51:18Z", + "published": "2022-01-28T22:25:03Z", + "aliases": [ + "CVE-2022-22932" + ], + "summary": "Path traversal in Apache Karaf", + "details": "Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.karaf:apache-karaf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.3.0" + }, + { + "fixed": "4.3.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.karaf:apache-karaf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.2.15" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932" + }, + { + "type": "WEB", + "url": "https://github.com/apache/karaf/pull/1485" + }, + { + "type": "WEB", + "url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4" + }, + { + "type": "WEB", + "url": "https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/karaf" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/KARAF-7326" + }, + { + "type": "WEB", + "url": "https://karaf.apache.org/security/cve-2022-22932.txt" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-01-27T23:10:36Z", + "nvd_published_at": "2022-01-26T11:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/asf__nifi_CVE-2023-34468_1.21.0.json b/advisory/asf__nifi_CVE-2023-34468_1.21.0.json new file mode 100644 index 0000000000000000000000000000000000000000..7c4dd656b125528c7d1e1366224084aeef908719 --- /dev/null +++ b/advisory/asf__nifi_CVE-2023-34468_1.21.0.json @@ -0,0 +1,108 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xm2m-2q6h-22jw", + "modified": "2023-06-21T13:48:41Z", + "published": "2023-06-12T18:30:18Z", + "aliases": [ + "CVE-2023-34468" + ], + "summary": "Apache NiFi vulnerable to Code Injection", + "details": "The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-dbcp-base" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.22.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-hikari-dbcp-service" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.22.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34468" + }, + { + "type": "WEB", + "url": "https://github.com/apache/nifi/pull/7349" + }, + { + "type": "WEB", + "url": "https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/nifi" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/NIFI-11653" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8" + }, + { + "type": "WEB", + "url": "https://nifi.apache.org/security.html#CVE-2023-34468" + }, + { + "type": "WEB", + "url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/06/12/3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-06-12T20:29:34Z", + "nvd_published_at": "2023-06-12T16:15:10Z" + } +} \ No newline at end of file diff --git a/advisory/asf__nifi_CVE-2023-36542_1.22.0.json b/advisory/asf__nifi_CVE-2023-36542_1.22.0.json new file mode 100644 index 0000000000000000000000000000000000000000..aa07e59a01ad4c5c72df2c5a0e723d9b041452cb --- /dev/null +++ b/advisory/asf__nifi_CVE-2023-36542_1.22.0.json @@ -0,0 +1,214 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r969-8v3h-23v9", + "modified": "2023-08-03T21:41:04Z", + "published": "2023-07-29T09:30:15Z", + "aliases": [ + "CVE-2023-36542" + ], + "summary": "Apache NiFi Code Injection vulnerability", + "details": "Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-cdc-mysql-bundle" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-jms-processors" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-standard-processors" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-dbcp-service" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-hikari-dbcp-service" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-hadoop-dbcp-service" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-hbase_2-client-service" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.nifi:nifi-record-serialization-services" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.2" + }, + { + "fixed": "1.23.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36542" + }, + { + "type": "WEB", + "url": "https://github.com/apache/nifi/commit/532578799c" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/nifi" + }, + { + "type": "WEB", + "url": "https://issues.apache.org/jira/browse/NIFI-11744" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof" + }, + { + "type": "WEB", + "url": "https://nifi.apache.org/security.html#CVE-2023-36542" + }, + { + "type": "WEB", + "url": "http://seclists.org/fulldisclosure/2023/Jul/43" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2023/07/29/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-07-31T22:03:10Z", + "nvd_published_at": "2023-07-29T08:15:48Z" + } +} \ No newline at end of file diff --git a/advisory/asf__tapestry-5_CVE-2019-0207_5.4.4.json b/advisory/asf__tapestry-5_CVE-2019-0207_5.4.4.json new file mode 100644 index 0000000000000000000000000000000000000000..b8cbca2e6616c94c99d490238625de19b55d52ba --- /dev/null +++ b/advisory/asf__tapestry-5_CVE-2019-0207_5.4.4.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-89r3-rcpj-h7w6", + "modified": "2023-03-06T20:46:38Z", + "published": "2019-11-18T17:19:03Z", + "aliases": [ + "CVE-2019-0207" + ], + "summary": "Path traversal attack on Windows platforms", + "details": "Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\\`, so attacker can perform a path traversal attack to read any files on Windows platform.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.tapestry:tapestry-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.4.0" + }, + { + "fixed": "5.4.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0207" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2019-11-18T14:18:47Z", + "nvd_published_at": "2019-09-16T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/aws__aws-sdk-java_CVE-2022-31159_1.12.260.json b/advisory/aws__aws-sdk-java_CVE-2022-31159_1.12.260.json new file mode 100644 index 0000000000000000000000000000000000000000..78f95d0cca8d37432f970f040d7581d39aa9c067 --- /dev/null +++ b/advisory/aws__aws-sdk-java_CVE-2022-31159_1.12.260.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c28r-hw5m-5gv3", + "modified": "2022-08-05T00:22:25Z", + "published": "2022-07-15T20:44:55Z", + "aliases": [ + "CVE-2022-31159" + ], + "summary": "Partial Path Traversal in com.amazonaws:aws-java-sdk-s3 ", + "details": "### Overview\n\nA partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. \n\nThis issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. \n\nVersions of the AWS Java SDK for S3 v1 before and including v1.12.260 are affected by this issue. \n\n### Impact\n\nIf `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory.\n\n#### Root Cause\n\nThe `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` contains a partial-path traversal vulnerability.\n\nThis is due to the guard logic in `leavesRoot` containing an insufficient protection against partial-path traversal.\n\nhttps://github.com/aws/aws-sdk-java/blob/5be0807af763b9fbf6b0a153c76dd305e407f035/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1513-L1519\n\nThe application controls the `localBaseDirectory` argument, but the `key` comes from the AWS bucket entry (ie. can be attacker controlled). The above bit of logic can be bypassed with the following payloads:\n\n```java\n// The following will return 'false', although the attacker value will \"leave\" the `/usr/foo` directory\nleavesRoot(new File(\"/usr/foo\"), \"/../foo-bar/bar\")\n```\n\nThis guard is used here which should guard against path traversal, however `leavesRoot` is an insufficient guard:\n\nhttps://github.com/aws/aws-sdk-java/blob/ae88c8aa4b195047b94c154897475f85642d7eb3/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1420-L1423\n\n#### True Root cause\n\n If the result of `parent.getCanonicalPath()` is not slash terminated it allows for partial path traversal.\n\n> Consider `\"/usr/outnot\".startsWith(\"/usr/out\")`. The check is bypassed although `outnot` is not under the `out` directory.\nThe terminating slash may be removed in various places. On Linux `println(new File(\"/var/\"))` returns `/var`, but `println(new File(\"/var\", \"/\"))` - `/var/`, however `println(new File(\"/var\", \"/\").getCanonicalPath())` - `/var`.\n \\- [@JarLob (Jaroslav Lobačevski)](https://github.com/JarLob)\n\n### Patches\n\nUpgrade to the AWS SDK for Java >= 1.12.261, if you are on a version < 1.12.261.\n\n### Workarounds\n\nWhen calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .\n\n### References\n\nSimilar vulnerabilities:\n - ESAPI (The OWASP Enterprise Security API) - https://nvd.nist.gov/vuln/detail/CVE-2022-23457\n\n### For more information\n\nIf you have any questions or comments about this advisory, please contact [AWS's Security team](mailto:aws-security@amazon.com).\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.amazonaws:aws-java-sdk-s3" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.12.261" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31159" + }, + { + "type": "WEB", + "url": "https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc48ddced8a9a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/aws/aws-sdk-java" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-07-15T20:44:55Z", + "nvd_published_at": "2022-07-15T18:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json b/advisory/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json new file mode 100644 index 0000000000000000000000000000000000000000..a92db51adfbe26e35ccbfa81c21f61ad3620c997 --- /dev/null +++ b/advisory/codecentric__spring-boot-admin_CVE-2022-46166_2.6.9.json @@ -0,0 +1,95 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w3x5-427h-wfq6", + "modified": "2022-12-09T20:19:32Z", + "published": "2022-12-09T20:19:32Z", + "aliases": [ + "CVE-2022-46166" + ], + "summary": "Spring Boot Admins integrated notifier support allows arbitrary code execution", + "details": "### Impact\nAll users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected.\n\n### Patches\nIn the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection).\n\n### Workarounds\n * Disable any notifier\n * Disable write access (POST request) on `/env` actuator endpoint\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "de.codecentric:spring-boot-admin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.6.10" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "de.codecentric:spring-boot-admin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.7.0" + }, + { + "fixed": "2.7.8" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "de.codecentric:spring-boot-admin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0-M1" + }, + { + "fixed": "3.0.0-M6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/codecentric/spring-boot-admin" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-12-09T20:19:32Z", + "nvd_published_at": "2022-12-09T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json b/advisory/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json new file mode 100644 index 0000000000000000000000000000000000000000..f8d84ad8b865581a5d2aff49f5c85c3dbbfa4dc0 --- /dev/null +++ b/advisory/codehaus-plexus__plexus-archiver_CVE-2018-1002200_3.5.json @@ -0,0 +1,89 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hcxq-x77q-3469", + "modified": "2022-06-30T15:19:51Z", + "published": "2022-05-13T01:35:03Z", + "aliases": [ + "CVE-2018-1002200" + ], + "summary": "Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver", + "details": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.codehaus.plexus:plexus-archiver" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.6.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1836" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1837" + }, + { + "type": "PACKAGE", + "url": "https://github.com/codehaus-plexus/plexus-archiver" + }, + { + "type": "WEB", + "url": "https://github.com/snyk/zip-slip-vulnerability" + }, + { + "type": "WEB", + "url": "https://snyk.io/research/zip-slip-vulnerability" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680" + }, + { + "type": "WEB", + "url": "https://www.debian.org/security/2018/dsa-4227" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-06-30T15:19:51Z", + "nvd_published_at": "2018-07-25T17:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json b/advisory/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json new file mode 100644 index 0000000000000000000000000000000000000000..821338280f27435b1b43fbe34054037b4f45cc76 --- /dev/null +++ b/advisory/codehaus-plexus__plexus-archiver_CVE-2023-37460_4.7.1.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wh3p-fphp-9h2m", + "modified": "2023-08-03T17:59:29Z", + "published": "2023-07-25T17:20:43Z", + "aliases": [ + "CVE-2023-37460" + ], + "summary": "Arbitrary File Creation in AbstractUnArchiver", + "details": "### Summary\n\nUsing AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution.\n\n### Description\nWhen extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the resolveFile() function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later Files.newOutputStream(), that follows symlinks by default, will actually write the entry's content to the symlink's target.\n\n### Impact\nWhoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution.\n\n### Technical Details\n\nIn [AbstractUnArchiver.java](https://github.com/codehaus-plexus/plexus-archiver/blob/plexus-archiver-4.7.1/src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java#L342):\n```java\nprotected void extractFile( final File srcF, final File dir, final InputStream compressedInputStream, String entryName, final Date entryDate, final boolean isDirectory, final Integer mode, String symlinkDestination, final FileMapper[] fileMappers)\n throws IOException, ArchiverException\n {\n ...\n // Hmm. Symlinks re-evaluate back to the original file here. Unsure if this is a good thing...\n final File targetFileName = FileUtils.resolveFile( dir, entryName );\n\n\n // Make sure that the resolved path of the extracted file doesn't escape the destination directory\n // getCanonicalFile().toPath() is used instead of getCanonicalPath() (returns String),\n // because \"/opt/directory\".startsWith(\"/opt/dir\") would return false negative.\n Path canonicalDirPath = dir.getCanonicalFile().toPath();\n Path canonicalDestPath = targetFileName.getCanonicalFile().toPath();\n\n\n if ( !canonicalDestPath.startsWith( canonicalDirPath ) )\n {\n throw new ArchiverException( \"Entry is outside of the target directory (\" + entryName + \")\" );\n }\n\n\n try\n {\n ...\n if ( !StringUtils.isEmpty( symlinkDestination ) )\n {\n SymlinkUtils.createSymbolicLink( targetFileName, new File( symlinkDestination ) );\n }\n else if ( isDirectory )\n {\n targetFileName.mkdirs();\n }\n else\n {\n try ( OutputStream out = Files.newOutputStream( targetFileName.toPath() ) )\n {\n IOUtil.copy( compressedInputStream, out );\n }\n }\n\n\n targetFileName.setLastModified( entryDate.getTime() );\n\n\n if ( !isIgnorePermissions() && mode != null && !isDirectory )\n {\n ArchiveEntryUtils.chmod( targetFileName, mode );\n }\n }\n catch ( final FileNotFoundException ex )\n {\n getLogger().warn( \"Unable to expand to file \" + targetFileName.getPath() );\n }\n }\n```\nWhen given an entry that already exists in dir as a symbolic link whose target does not exist - the symbolic link’s target will be created and the content of the archive’s entry will be written to it.\n\nThat’s because the way FileUtils.resolveFile() works:\n```java\npublic static File resolveFile( final File baseFile, String filename )\n {\n ...\n try\n {\n file = file.getCanonicalFile();\n }\n catch ( final IOException ioe )\n {\n // nop\n }\n\n\n return file;\n }\n```\nFile.getCanonicalFile() (tested with the most recent version of openjdk (22.2) on Unix) will eventually call [JDK_Canonicalize()](https://github.com/openjdk/jdk/blob/jdk-22%2B2/src/java.base/unix/native/libjava/canonicalize_md.c#LL48C1-L68C69):\n```cpp\nJNIEXPORT int\nJDK_Canonicalize(const char *orig, char *out, int len)\n{\n if (len < PATH_MAX) {\n errno = EINVAL;\n return -1;\n }\n\n if (strlen(orig) > PATH_MAX) {\n errno = ENAMETOOLONG;\n return -1;\n }\n\n /* First try realpath() on the entire path */\n if (realpath(orig, out)) {\n /* That worked, so return it */\n collapse(out);\n return 0;\n } else {\n /* Something's bogus in the original path, so remove names from the end\n until either some subpath works or we run out of names */\n ...\n```\nrealpath() returns the destination path for a symlink, if this destination exists. But if it doesn’t - \nit will return NULL and we will reach the else’s clause, which will eventually return the path of the symlink itself.\nSo in case the entry is already exists as a symbolic link to a non-existing file - file.getCanonicalFile() will return the absolute path of the symbolic link and this check will pass:\n```java\nPath canonicalDirPath = dir.getCanonicalFile().toPath();\nPath canonicalDestPath = targetFileName.getCanonicalFile().toPath();\n\n\nif ( !canonicalDestPath.startsWith( canonicalDirPath ) )\n{\n throw new ArchiverException( \"Entry is outside of the target directory (\" + entryName + \")\" );\n}\n```\nLater, the content of the entry will be written to the symbolic link’s destination and by doing so will create the destination file and fill it with the entry’s content.\n\nArbitrary file creation can lead to remote code execution. For example, if there is an SSH server on the victim’s machine and ~/.ssh/authorized_keys does not exist - creating this file and filling it with an attacker's public key will allow the attacker to connect the SSH server without knowing the victim’s password.\n\n### PoC\nWe created a zip as following:\n```bash\n$ ln -s /tmp/target entry1\n$ echo -ne “content” > entry2\n$ zip --symlinks archive.zip entry1 entry2\n```\nThe following command will change the name of entry2 to entry1:\n```bash\n$ sed -i 's/entry2/entry1/' archive.zip\n```\nWe put archive.zip in /tmp and create a dir for the extracted files:\n```bash\n$ cp archive.zip /tmp\n$ mkdir /tmp/extracted_files\n```\nNext, we wrote a java code that opens archive.zip:\n```java\npackage com.example;\n\nimport java.io.File;\n\nimport org.codehaus.plexus.archiver.zip.ZipUnArchiver;\n\npublic class App \n{\n public static void main( String[] args )\n {\n ZipUnArchiver unArchiver = new ZipUnArchiver(new File(\"/tmp/archive.zip\"));\n unArchiver.setDestDirectory(new File(\"/tmp/extracted_files\"));\n unArchiver.extract(); \n }\n}\n```\nAfter running this java code, we can see that /tmp/target contains the string “content”:\n```\n$ cat /tmp/target\ncontent\n```\nNotice that although we used here a duplicated entry name in the same archive, this attack can be performed also by two different archives - one that contains a symlink and another archive that contains a regular file with the same entry name as the symlink.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.codehaus.plexus:plexus-archiver" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.8.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37460" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-archiver/commit/54759839fbdf85caf8442076f001d5fd64e0dcb2" + }, + { + "type": "PACKAGE", + "url": "https://github.com/codehaus-plexus/plexus-archiver" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-archiver/releases/tag/plexus-archiver-4.8.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-07-25T17:20:43Z", + "nvd_published_at": "2023-07-25T20:15:13Z" + } +} \ No newline at end of file diff --git a/advisory/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json b/advisory/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json new file mode 100644 index 0000000000000000000000000000000000000000..c5c2659f0bafeede9e197317707b4f3df9b6f8f7 --- /dev/null +++ b/advisory/codehaus-plexus__plexus-utils_CVE-2017-1000487_3.0.15.json @@ -0,0 +1,101 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8vhq-qq4p-grq3", + "modified": "2022-07-01T21:47:32Z", + "published": "2022-05-13T01:11:53Z", + "aliases": [ + "CVE-2017-1000487" + ], + "summary": "OS Command Injection in Plexus-utils", + "details": "Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.codehaus.plexus:plexus-utils" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.0.16" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000487" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1322" + }, + { + "type": "PACKAGE", + "url": "https://github.com/codehaus-plexus/plexus-utils" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522" + }, + { + "type": "WEB", + "url": "https://www.debian.org/security/2018/dsa-4146" + }, + { + "type": "WEB", + "url": "https://www.debian.org/security/2018/dsa-4149" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-07-01T21:47:32Z", + "nvd_published_at": "2018-01-03T20:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json b/advisory/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json new file mode 100644 index 0000000000000000000000000000000000000000..b40797161eb8060668b89675e161711c69274f1f --- /dev/null +++ b/advisory/codehaus-plexus__plexus-utils_CVE-2022-4244_3.0.23.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6ph-x5wf-g337", + "modified": "2023-10-02T22:07:45Z", + "published": "2023-09-25T21:30:26Z", + "aliases": [ + "CVE-2022-4244" + ], + "summary": "plexus-codehaus vulnerable to directory traversal", + "details": "A flaw was found in plexus-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with dot-dot-slash (`../`) sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.codehaus.plexus:plexus-utils" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.0.24" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4244" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-utils/issues/4" + }, + { + "type": "WEB", + "url": "https://github.com/codehaus-plexus/plexus-utils/commit/33a2853df8185b4519b1b8bfae284f03392618ef" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2023:3906" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2022-4244" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149841" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31521" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-09-26T17:59:40Z", + "nvd_published_at": "2023-09-25T20:15:10Z" + } +} \ No newline at end of file diff --git a/advisory/diffplug__goomph_CVE-2022-26049_3.37.1.json b/advisory/diffplug__goomph_CVE-2022-26049_3.37.1.json new file mode 100644 index 0000000000000000000000000000000000000000..e4ce20ac4be313649f35496d4e2643cebb863c33 --- /dev/null +++ b/advisory/diffplug__goomph_CVE-2022-26049_3.37.1.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p2f7-9cv7-jjf6", + "modified": "2022-09-19T20:25:28Z", + "published": "2022-09-12T00:00:33Z", + "aliases": [ + "CVE-2022-26049" + ], + "summary": "Goomph before 3.37.2 allows malicious zip file to write contents to arbitrary locations", + "details": "This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability.\n\n**Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.diffplug.gradle:goomph" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.37.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26049" + }, + { + "type": "WEB", + "url": "https://github.com/diffplug/goomph/pull/198" + }, + { + "type": "WEB", + "url": "https://github.com/diffplug/goomph/commit/25f04f67ba62d9a14104bee13a0a0f2517afb8c8" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JAVA-COMDIFFPLUGGRADLE-2981040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-09-15T03:28:31Z", + "nvd_published_at": "2022-09-11T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/dromara__hutool_CVE-2018-17297_4.1.11.json b/advisory/dromara__hutool_CVE-2018-17297_4.1.11.json new file mode 100644 index 0000000000000000000000000000000000000000..93dbf38749cc1e9112fa3823fe69a7239ec384fb --- /dev/null +++ b/advisory/dromara__hutool_CVE-2018-17297_4.1.11.json @@ -0,0 +1,103 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rhq2-2574-78mc", + "modified": "2022-04-27T14:42:53Z", + "published": "2018-10-17T19:54:53Z", + "aliases": [ + "CVE-2018-17297" + ], + "summary": "Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal", + "details": "The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "cn.hutool:hutool-parent" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.1.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "cn.hutool:hutool-all" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.1.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "cn.hutool:hutool-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "4.1.12" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17297" + }, + { + "type": "WEB", + "url": "https://github.com/looly/hutool/issues/162" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-rhq2-2574-78mc" + }, + { + "type": "PACKAGE", + "url": "https://github.com/looly/hutool" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:55:00Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json b/advisory/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json new file mode 100644 index 0000000000000000000000000000000000000000..805a12e0fd05f20455793e2cbcea21aefdccd12b --- /dev/null +++ b/advisory/eclipse-ee4j__glassfish_CVE-2022-2712_6.2.5.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3g5w-6pw7-6hrp", + "modified": "2023-01-28T01:19:43Z", + "published": "2023-01-27T12:30:29Z", + "aliases": [ + "CVE-2022-2712" + ], + "summary": "Path Traversal In Eclipse GlassFish", + "details": "In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.glassfish.main.web:web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.1.0" + }, + { + "fixed": "7.0.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2712" + }, + { + "type": "WEB", + "url": "https://github.com/eclipse-ee4j/glassfish/pull/24077" + }, + { + "type": "WEB", + "url": "https://bugs.eclipse.org/580502" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-01-28T01:19:43Z", + "nvd_published_at": "2023-01-27T10:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json b/advisory/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json new file mode 100644 index 0000000000000000000000000000000000000000..420c1362d95fae35b674be32d60af011e3e9c385 --- /dev/null +++ b/advisory/eclipse__hawkbit_CVE-2020-27219_0.3.0M6.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rcvx-rmvf-mxch", + "modified": "2021-04-06T21:53:29Z", + "published": "2022-02-09T22:19:44Z", + "aliases": [ + "CVE-2020-27219" + ], + "summary": "Cross-site Scripting in Eclipse Hawkbit", + "details": "In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.eclipse.hawkbit:hawkbit-parent" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.3.0M7" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.3.0M6" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27219" + }, + { + "type": "WEB", + "url": "https://github.com/eclipse/hawkbit/issues/1067" + }, + { + "type": "WEB", + "url": "https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9" + }, + { + "type": "WEB", + "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-04-06T21:53:29Z", + "nvd_published_at": "2021-01-14T23:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json b/advisory/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json new file mode 100644 index 0000000000000000000000000000000000000000..6ae72bfab94b6b259ada340d37f0cd7dac0b7ded --- /dev/null +++ b/advisory/fabric8io__kubernetes-client_CVE-2021-4178_5.0.2.json @@ -0,0 +1,192 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-98g7-rxmf-rrxm", + "modified": "2022-09-08T14:19:24Z", + "published": "2022-07-15T05:17:35Z", + "aliases": [ + "CVE-2021-4178" + ], + "summary": "fabric8 kubernetes-client vulnerable ", + "details": "fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.0.0-beta-1" + }, + { + "fixed": "5.0.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.1.0" + }, + { + "fixed": "5.1.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.2.0" + }, + { + "fixed": "5.3.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.5.0" + }, + { + "fixed": "5.7.4" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.8.0" + }, + { + "fixed": "5.8.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.9.0" + }, + { + "fixed": "5.10.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.fabric8:kubernetes-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.11.0" + }, + { + "fixed": "5.11.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178" + }, + { + "type": "WEB", + "url": "https://github.com/fabric8io/kubernetes-client/issues/3653" + }, + { + "type": "WEB", + "url": "https://github.com/fabric8io/kubernetes-client/commit/445103004d1ed3153d5abb272473451d05891e39" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/cve-2021-4178" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" + }, + { + "type": "PACKAGE", + "url": "https://github.com/fabric8io/kubernetes-client" + }, + { + "type": "WEB", + "url": "https://www.mend.io/vulnerability-database/CVE-2021-4178" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502", + "CWE-94" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-07-15T05:17:35Z", + "nvd_published_at": "2022-08-24T16:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/ff4j__ff4j_CVE-2022-44262_1.8.13.json b/advisory/ff4j__ff4j_CVE-2022-44262_1.8.13.json new file mode 100644 index 0000000000000000000000000000000000000000..962eb386fd3ede4fc7aaa0c41acc46c2e4dd63e2 --- /dev/null +++ b/advisory/ff4j__ff4j_CVE-2022-44262_1.8.13.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-65hj-9ppw-77xc", + "modified": "2022-12-21T18:16:26Z", + "published": "2022-12-01T06:30:26Z", + "aliases": [ + "CVE-2022-44262" + ], + "summary": "ff4j is vulnerable to Remote Code Execution (RCE)", + "details": "ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE). This issue has been patched in version 1.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.ff4j:ff4j-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.8.1" + }, + { + "fixed": "1.9" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44262" + }, + { + "type": "WEB", + "url": "https://github.com/ff4j/ff4j/issues/624" + }, + { + "type": "WEB", + "url": "https://github.com/ff4j/ff4j/commit/62d03140f3bfbd380d0f4b4e5a94dcb8baa9d9c6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ff4j/ff4j" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-12-05T22:13:55Z", + "nvd_published_at": "2022-12-01T05:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json b/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json new file mode 100644 index 0000000000000000000000000000000000000000..53e52c495ee3e976ed55392cccbc1295fc7e7d54 --- /dev/null +++ b/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-24057_5.6.91.json @@ -0,0 +1,164 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jqh6-9574-5x22", + "modified": "2023-02-28T20:40:27Z", + "published": "2023-01-23T22:05:28Z", + "aliases": [ + "CVE-2023-24057" + ], + "summary": " MITM based Zip Slip in `ca.uhn.hapi.fhir:org.hl7.fhir.core`", + "details": "### Impact\n\nMITM can enable Zip-Slip.\n\n### Vulnerability\n\n#### Vulnerability 1: `Scanner.java`\n\nThere is no validation that the zip file being unpacked has entries that are not maliciously writing outside of the intended destination directory.\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L335-L357\n\nThis zip archive is downloaded over HTTP instead of HTTPS, leaving it vulnerable to compromise in-flight.\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L136\n\n##### Vulnerability 2: `TerminologyCacheManager.java`\n\n**Note:** While these links point to only one implementation, both implementations of `TerminologyCacheManager.java` are vulnerable to this as their code seems to be duplicated.\n - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java\n - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java\n\nWhile there is validation in this bit of logic that attempts to validate that the zip file doesn't contain malicious entries that escape the destination directory, the guard is insufficient.\n\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L97-L113\n\nThis is because the `Utilities.path(String... path)` method does not normalize the path, although it seems to be attempting to do so.\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.utilities/src/main/java/org/hl7/fhir/utilities/Utilities.java#L617-L675\n\nThe normalization only occurs if the path element starts with a path traversal payload. As an example, calling `Utilities.path(\"/base\", \"/child/../test\")` will return the string `\"/base/child/../test\"`.\n\nThis guard logic can, thus, be easily bypassed:\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L100-L104\n\nAssuming an attacker can control the return value of `ze.getName()`, they can supply a value like `/anything/../../../../zipsip-protection-bypass.txt`.\n\nSimilarly, an attacker can control the contents of the Zip file via a MITM attack as this logic is used with resources not downloaded over HTTPS.\n\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L66-L73\n\n\n### Patches\nUnknown\n\n### Workarounds\nUnknown\n\n### References\n\n - https://snyk.io/research/zip-slip-vulnerability", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.convertors" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r4b" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r5" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.utilities" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.validation" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.92" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg" + }, + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-jqh6-9574-5x22" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24057" + }, + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/commit/b50aec59124416b7315a49220cfc3999223414cc" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hapifhir/org.hl7.fhir.core" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2023-01-23T22:05:28Z", + "nvd_published_at": "2023-01-26T21:18:00Z" + } +} \ No newline at end of file diff --git a/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json b/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json new file mode 100644 index 0000000000000000000000000000000000000000..4bae5b84b96603230fc5061a248518031a8a1a78 --- /dev/null +++ b/advisory/hapifhir__org.hl7.fhir.core_CVE-2023-28465_5.6.105.json @@ -0,0 +1,180 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9654-pr4f-gh6m", + "modified": "2023-12-15T22:19:57Z", + "published": "2023-03-10T22:15:55Z", + "aliases": [ + "CVE-2023-28465" + ], + "summary": "HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057", + "details": "### Impact\n\nZip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability.\n\nThis issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories.\n\nTo demonstrate the vulnerability, consider `userControlled.getCanonicalPath().startsWith(\"/usr/out\")` will allow an attacker to access a directory with a name like `/usr/outnot`. \n\n### Why?\n\nTo demonstrate this vulnerability, consider `\"/usr/outnot\".startsWith(\"/usr/out\")`.\nThe check is bypassed although `/outnot` is not under the `/out` directory.\nIt's important to understand that the terminating slash may be removed when using various `String` representations of the `File` object.\nFor example, on Linux, `println(new File(\"/var\"))` will print `/var`, but `println(new File(\"/var\", \"/\")` will print `/var/`;\nhowever, `println(new File(\"/var\", \"/\").getCanonicalPath())` will print `/var`.\n\n### The Fix\n\nComparing paths with the `java.nio.files.Path#startsWith` will adequately protect againts this vulnerability.\n\nFor example: `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY)` or `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath())`\n\n### Other Examples\n\n - [CVE-2022-31159](https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3) - aws/aws-sdk-java\n - [CVE-2022-23457](https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/) - ESAPI/esapi-java-legacy\n\n### Vulnerability\n\nhttps://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105\n\nWhile `getAbsolutePath` will return a normalized path, because the string `path` is not slash terminated, the guard can be bypassed to write the contents of the Zip file to a sibling directory of the cache directory.\n\n### Patches\nAll org.hl7.fhir.core libraries should be updated to 5.6.106.\n - https://github.com/hapifhir/org.hl7.fhir.core/pull/1162\n\n### Workarounds\nUnknown\n\n### References\n* https://snyk.io/research/zip-slip-vulnerability\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.convertors" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r4b" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.r5" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.utilities" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "ca.uhn.hapi.fhir:org.hl7.fhir.validation" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.6.106" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-9654-pr4f-gh6m" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28465" + }, + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/pull/1162" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-9654-pr4f-gh6m" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hapifhir/org.hl7.fhir.core" + }, + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105" + }, + { + "type": "WEB", + "url": "https://github.com/hapifhir/org.hl7.fhir.core/releases/tag/5.6.106" + }, + { + "type": "WEB", + "url": "https://www.smilecdr.com/our-blog" + }, + { + "type": "WEB", + "url": "https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-03-10T22:15:55Z", + "nvd_published_at": "2023-12-12T17:15:07Z" + } +} \ No newline at end of file diff --git a/advisory/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json b/advisory/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json new file mode 100644 index 0000000000000000000000000000000000000000..baa8488b204470691723985612b6b7fa55076b4e --- /dev/null +++ b/advisory/hibernate__hibernate-validator_CVE-2019-10219_6.0.17.Final.json @@ -0,0 +1,121 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m8p2-495h-ccmh", + "modified": "2022-02-08T22:07:14Z", + "published": "2020-01-08T17:01:52Z", + "aliases": [ + "CVE-2019-10219" + ], + "summary": "The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks", + "details": "A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.hibernate.validator:hibernate-validator" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "6.0.18" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" + }, + { + "type": "WEB", + "url": "https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee" + }, + { + "type": "WEB", + "url": "https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20220210-0024" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hibernate/hibernate-validator" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2020:0445" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2020:0164" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2020:0161" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2020:0160" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2020:0159" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-01-08T17:00:14Z", + "nvd_published_at": "2019-11-08T15:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json b/advisory/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json new file mode 100644 index 0000000000000000000000000000000000000000..7765e61a60b2c4c9d78ace6fbca9c85ee7fc5344 --- /dev/null +++ b/advisory/jenkinsci__docker-commons-plugin_CVE-2022-20617_1.17.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jpxj-vgq5-prjc", + "modified": "2023-10-27T16:23:06Z", + "published": "2022-01-13T00:01:03Z", + "aliases": [ + "CVE-2022-20617" + ], + "summary": "OS command execution vulnerability in Jenkins Docker Commons Plugin", + "details": "Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins:docker-commons" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.18" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20617" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/docker-commons-plugin/commit/c069b79c31c5aa80a01b0c462f0dc6b41751f059" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jenkinsci/docker-commons-plugin" + }, + { + "type": "WEB", + "url": "https://plugins.jenkins.io/docker-commons" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/01/12/6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-04-29T04:27:21Z", + "nvd_published_at": "2022-01-12T20:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json b/advisory/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json new file mode 100644 index 0000000000000000000000000000000000000000..ee624e67de495a12b0e219c244d7c692f1265399 --- /dev/null +++ b/advisory/jenkinsci__git-client-plugin_CVE-2019-10392_2.8.4.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hw6x-2qwv-rxr7", + "modified": "2022-06-28T22:28:13Z", + "published": "2022-05-24T16:55:58Z", + "aliases": [ + "CVE-2019-10392" + ], + "summary": "Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin", + "details": "Jenkins Git Client Plugin 2.8.4 and earlier did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins:git-client" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.8.5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.8.4" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10392" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/git-client-plugin/commit/899123fa2eb9dd2c37137aae630c47c6be6b4b02" + }, + { + "type": "WEB", + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-28T22:28:13Z", + "nvd_published_at": "2019-09-12T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json b/advisory/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json new file mode 100644 index 0000000000000000000000000000000000000000..287834c314679ac80d23a1d0b6baebc544bffbac --- /dev/null +++ b/advisory/jenkinsci__perfecto-plugin_CVE-2020-2261_1.17.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jq84-6fmm-6qv6", + "modified": "2022-12-29T01:42:56Z", + "published": "2022-05-24T17:28:26Z", + "aliases": [ + "CVE-2020-2261" + ], + "summary": "OS command execution vulnerability in Perfecto Plugin", + "details": "Perfecto Plugin allows specifying Perfecto Connect Path and Perfecto Connect File Name in job configurations.\n\nThis command is executed on the Jenkins controller in Perfecto Plugin 1.17 and earlier, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller.\n\nPerfecto Plugin 1.18 executes the specified commands on the agent the build is running on.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.jenkins.plugins:perfecto" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.18" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.17" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2261" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jenkinsci/perfecto-plugin" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1980" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-12-29T01:42:56Z", + "nvd_published_at": "2020-09-16T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json b/advisory/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json new file mode 100644 index 0000000000000000000000000000000000000000..d23d145c6a302785de035e4ce0c49dca09907509 --- /dev/null +++ b/advisory/jenkinsci__script-security-plugin_CVE-2023-24422_1228.vd93135a_2fb_25.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76qj-9gwh-pvv3", + "modified": "2023-02-06T16:45:45Z", + "published": "2023-01-26T21:30:19Z", + "aliases": [ + "CVE-2023-24422" + ], + "summary": "Sandbox bypass in Jenkins Script Security Plugin", + "details": "A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins:script-security" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1229.v4880b" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24422" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/script-security-plugin/commit/4880bbe905a6783d80150c8b881d0127430d4a73" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jenkinsci/script-security-plugin" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-01-27T01:05:51Z", + "nvd_published_at": "2023-01-26T21:18:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json b/advisory/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json new file mode 100644 index 0000000000000000000000000000000000000000..099753dd7326bf1728ba2b5355c3be4efd730027 --- /dev/null +++ b/advisory/jenkinsci__workflow-cps-global-lib-plugin_CVE-2022-25174_544.vff04fa68714d.json @@ -0,0 +1,103 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g9fx-6j5c-grmw", + "modified": "2023-05-25T13:24:03Z", + "published": "2022-02-16T00:01:36Z", + "aliases": [ + "CVE-2022-25174" + ], + "summary": "Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin", + "details": "Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "544.vff04fa68714d" + }, + { + "fixed": "561.va" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.19" + }, + { + "fixed": "2.21.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps-global-lib" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.18.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25174" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/ace0de3c2d691662021ea10306eeb407da6b6365" + }, + { + "type": "WEB", + "url": "https://github.com/CVEProject/cvelist/blob/e19344451ce1c4a4181b9f094b8fd38cd8d86c9f/2022/25xxx/CVE-2022-25174.json" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-20T22:48:09Z", + "nvd_published_at": "2022-02-15T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json b/advisory/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json new file mode 100644 index 0000000000000000000000000000000000000000..e63aaadc5eae6e2a3b6b99c9bc2d51c7fea650e9 --- /dev/null +++ b/advisory/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646.v6ed3b5b01ff1.json @@ -0,0 +1,107 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4m7p-55jm-3vwv", + "modified": "2023-05-25T13:20:35Z", + "published": "2022-02-16T00:01:37Z", + "aliases": [ + "CVE-2022-25173" + ], + "summary": "Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin", + "details": "Jenkins Pipeline: Groovy Plugin prior to 2656.vf7a_e7b_75a_457, 2.94.1, and 2.92.1 uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2646.v6ed3b5b01ff1" + }, + { + "fixed": "2656.vf7a" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.93" + }, + { + "fixed": "2.94.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-cps" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.92.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25173" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/workflow-cps-plugin/commit/f7ae7b75a457976853539bff1db52373b85fdb85" + }, + { + "type": "WEB", + "url": "https://github.com/CVEProject/cvelist/blob/3615f493b8a36ff15735fb9d79c9dc9e0d542695/2022/25xxx/CVE-2022-25173.json" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2022/02/15/2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-20T22:48:23Z", + "nvd_published_at": "2022-02-15T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json b/advisory/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json new file mode 100644 index 0000000000000000000000000000000000000000..28d705dcbaa85834929153eeec891237a826dd4c --- /dev/null +++ b/advisory/jenkinsci__workflow-multibranch-plugin_CVE-2022-25175_706.vd43c65dec013.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj84-qjm3-77mg", + "modified": "2022-07-21T16:18:43Z", + "published": "2022-02-16T00:01:36Z", + "aliases": [ + "CVE-2022-25175" + ], + "summary": "Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection", + "details": "Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses distinct checkout directories per SCM for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jenkins-ci.plugins.workflow:workflow-multibranch" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "707.v71c3f0a_6ccdb" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 706.vd43c65dec013" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25175" + }, + { + "type": "WEB", + "url": "https://github.com/jenkinsci/workflow-multibranch-plugin/commit/71c3f0a6ccdb2ba43f43686826b0d62160df85e8" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-20T22:46:22Z", + "nvd_published_at": "2022-02-15T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json b/advisory/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json new file mode 100644 index 0000000000000000000000000000000000000000..9766b64e477ce9f5c84f2239e412a8f7b3c0ea9d --- /dev/null +++ b/advisory/jeremylong__DependencyCheck_CVE-2018-12036_3.1.2.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hcwx-7q5v-vc67", + "modified": "2022-11-01T22:37:41Z", + "published": "2022-05-14T03:12:09Z", + "aliases": [ + "CVE-2018-12036" + ], + "summary": "Path Traversal in OWASP Dependency-Check", + "details": "OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp:dependency-check-maven" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.2.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12036" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jeremylong/DependencyCheck" + }, + { + "type": "WEB", + "url": "https://github.com/jeremylong/DependencyCheck/blob/master/RELEASE_NOTES.md#version-320-2018-05-21" + }, + { + "type": "WEB", + "url": "https://github.com/snyk/zip-slip-vulnerability" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-11-01T22:37:41Z", + "nvd_published_at": "2018-06-07T18:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/jlangch__venice_CVE-2022-36007_1.10.16.json b/advisory/jlangch__venice_CVE-2022-36007_1.10.16.json new file mode 100644 index 0000000000000000000000000000000000000000..71dbaa2a4f6999f45b97c460dc743254b113b035 --- /dev/null +++ b/advisory/jlangch__venice_CVE-2022-36007_1.10.16.json @@ -0,0 +1,76 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4mmh-5vw7-rgvj", + "modified": "2022-08-18T19:07:58Z", + "published": "2022-08-18T19:07:58Z", + "aliases": [ + "CVE-2022-36007" + ], + "summary": "Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource`", + "details": "### Impact\nA partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths.\n\nAssuming Venice has been configured with the load paths: `[ \"/Users/foo/resources\" ]` \n\nWhen passing **relative** paths to these two vulnerable functions everything is fine:\n`(load-resource \"test.png\")` => loads the file \"/Users/foo/resources/test.png\"\n`(load-resource \"../resources-alt/test.png\")` => rejected, outside the load path\n\nWhen passing **absolute** paths to these two vulnerable functions Venice may return files outside the configured load paths:\n`(load-resource \"/Users/foo/resources/test.png\")` => loads the file \"/Users/foo/resources/test.png\"\n`(load-resource \"/Users/foo/resources-alt/test.png\")` => loads the file \"/Users/foo/resources-alt/test.png\" !!!\nThe latter call suffers from the _Partial Path Traversal_ vulnerability.\n\nThis issue’s scope is limited to absolute paths whose name prefix matches a load path. E.g. for a load-path `\"/Users/foo/resources\"`, the actor can cause loading a resource also from `\"/Users/foo/resources-alt\"`, but not from `\"/Users/foo/images\"`.\n\nVersions of Venice before and including v1.10.16 are affected by this issue.\n\n### Patches\nUpgrade to Venice >= 1.10.17, if you are on a version < 1.10.17\n\n### Workarounds\nIf you cannot upgrade the library, you can control the functions that can be used in Venice with a sandbox. If it is appropriate, the functions `load-file` and `load-resource` can be blacklisted in the sandbox.\n\n### References\n * [PR](https://github.com/jlangch/venice/pull/4/commits/c942c73136333bc493050910f171a48e6f575b23)\n \n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [GitHub Venice](https://github.com/jlangch/venice)\n* Email us at [juerg.ch](mailto:juerg.ch@ggaweb.ch)\n\n### Credits\n\nI want to publicly recognize the contribution of [Jonathan Leitschuh](https://github.com/JLLeitschuh) for reporting this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.github.jlangch:venice" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.10.17" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.10.16" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36007" + }, + { + "type": "WEB", + "url": "https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d561ae0a" + }, + { + "type": "WEB", + "url": "https://github.com/jlangch/venice/commit/c942c73136333bc493050910f171a48e6f575b23" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jlangch/venice" + }, + { + "type": "WEB", + "url": "https://github.com/jlangch/venice/releases/tag/v1.10.17" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-08-18T19:07:58Z", + "nvd_published_at": "2022-08-15T11:21:00Z" + } +} \ No newline at end of file diff --git a/advisory/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json b/advisory/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json new file mode 100644 index 0000000000000000000000000000000000000000..a0cd5cd874403abe7c7c8387dbcb96895fe77760 --- /dev/null +++ b/advisory/jmrozanec__cron-utils_CVE-2021-41269_9.1.5.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9m8-27x8-rg87", + "modified": "2021-11-15T22:23:17Z", + "published": "2021-11-15T23:27:11Z", + "aliases": [ + "CVE-2021-41269" + ], + "summary": "Critical vulnerability found in cron-utils", + "details": "### Impact\nA Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.\n\n### Patches\nThe issue was patched and a new version was released. Please upgrade to version 9.1.6.\n\n### Workarounds\nThere are no known workarounds up to this moment.\n\n### References\nA description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461)\n\n### For more information\nIf you have any questions or comments about this advisory:\n\nOpen an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.cronutils:cron-utils" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "9.1.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269" + }, + { + "type": "WEB", + "url": "https://github.com/jmrozanec/cron-utils/issues/461" + }, + { + "type": "WEB", + "url": "https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da" + }, + { + "type": "WEB", + "url": "https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jmrozanec/cron-utils" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-11-15T22:23:17Z", + "nvd_published_at": "2021-11-15T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/joniles__mpxj_CVE-2020-35460_8.3.4.json b/advisory/joniles__mpxj_CVE-2020-35460_8.3.4.json new file mode 100644 index 0000000000000000000000000000000000000000..1270e5e971134fefea9f21c59750c462ac1162cc --- /dev/null +++ b/advisory/joniles__mpxj_CVE-2020-35460_8.3.4.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p9j6-4pjr-gp48", + "modified": "2022-08-11T16:59:22Z", + "published": "2020-12-18T18:28:23Z", + "aliases": [ + "CVE-2020-35460" + ], + "summary": "MPXJ path Traversal vulnerability", + "details": "common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "net.sf.mpxj:mpxj" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "8.3.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35460" + }, + { + "type": "WEB", + "url": "https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "type": "WEB", + "url": "http://www.mpxj.org/changes-report.html#a8.3.5" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-12-17T23:15:51Z", + "nvd_published_at": "2020-12-14T23:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/jstachio__jstachio_CVE-2023-33962_1.0.0.json b/advisory/jstachio__jstachio_CVE-2023-33962_1.0.0.json new file mode 100644 index 0000000000000000000000000000000000000000..01bfc4f4070642d8f4eeab8dcb2ef520382120fb --- /dev/null +++ b/advisory/jstachio__jstachio_CVE-2023-33962_1.0.0.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwxv-jv83-6qjr", + "modified": "2023-06-06T00:45:18Z", + "published": "2023-06-06T00:45:18Z", + "aliases": [ + "CVE-2023-33962" + ], + "summary": "JStachio XSS vulnerability: Unescaped single quotes", + "details": "### Impact\n\n#### Description:\nJStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code.\n\n#### Reproduction Steps:\nUse the following template code:\n```html\n
\n```\n\nSet the value variable to `' onblur='alert(1)`.\n\n```java\npublic class Escaping {\n\n public static void main(String[] args) {\n Model model = new Model(\"' onblur='alert(1)\");\n String result = AttributeTemplate.of().execute(model);\n System.out.println(result);\n }\n\n @JStache(template = \"
\",\n name=\"AttributeTemplate\")\n @JStacheConfig(contentType= Html.class)\n public static class Model {\n\n public final String value;\n\n public Model(String value) {\n this.value = value;\n }\n\n public String getValue() {\n return value;\n }\n }\n}\n```\n\nExpected Result:\nThe resulting output should have properly escaped the single quotes and not execute the injected JavaScript code.\n\nActual Result:\nThe resulting output is vulnerable and renders as follows:\n```html\n
\n```\n\n#### Impact and Risk:\nThis vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware.\n\n#### Proposed Solution:\nTo mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`.\n\n### Patches\n-\n\n### Workarounds\nAs long as users stick with double quotes `\"` for HTML attributes, they should not be affected.\n\n### References\nFor instance, [Rocker's general purpose HTML escaping](https://github.com/fizzed/rocker/blob/d749fbf68179b31a64d541f5e18e0e25bc5c2d1b/rocker-runtime/src/main/java/com/fizzed/rocker/runtime/DefaultHtmlStringify.java#L64)\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.jstach:jstachio" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33962" + }, + { + "type": "WEB", + "url": "https://github.com/jstachio/jstachio/issues/157" + }, + { + "type": "WEB", + "url": "https://github.com/jstachio/jstachio/pull/158" + }, + { + "type": "WEB", + "url": "https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jstachio/jstachio" + }, + { + "type": "WEB", + "url": "https://github.com/jstachio/jstachio/releases/tag/v1.0.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-06-06T00:45:18Z", + "nvd_published_at": "2023-05-30T22:15:10Z" + } +} \ No newline at end of file diff --git a/advisory/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json b/advisory/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json new file mode 100644 index 0000000000000000000000000000000000000000..e12086b5f4342bb1ad9f1279fd130d944d0906eb --- /dev/null +++ b/advisory/keycloak__keycloak_CVE-2014-3656_1.0.5.Final.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-px42-mr8m-cpgh", + "modified": "2023-08-07T20:27:41Z", + "published": "2022-05-17T19:57:06Z", + "aliases": [ + "CVE-2014-3656" + ], + "summary": "JBoss KeyCloak Cross-site Scripting Vulnerability", + "details": "If a JBoss Keycloak application was configured to use `*` as a permitted web origin in the Keycloak administrative console, crafted requests to the `login-status-iframe.html` endpoint could inject arbitrary Javascript into the generated HTML code via the \"origin\" query parameter, leading to a cross-site scripting (XSS) vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.1.0.Beta1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3656" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/commit/63b41e2548cbc20bd3758e34a82d880e177bf24c" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/cve-2014-3656" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3656" + }, + { + "type": "WEB", + "url": "https://issues.jboss.org/browse/KEYCLOAK-703" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGKEYCLOAK-31231" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-08-07T20:27:41Z", + "nvd_published_at": "2019-12-10T14:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/keycloak__keycloak_CVE-2022-1274_20.0.4.json b/advisory/keycloak__keycloak_CVE-2022-1274_20.0.4.json new file mode 100644 index 0000000000000000000000000000000000000000..8fcf48360d58f51bc4460883ef48e88ace2c4263 --- /dev/null +++ b/advisory/keycloak__keycloak_CVE-2022-1274_20.0.4.json @@ -0,0 +1,78 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4fv-gm5m-4725", + "modified": "2023-04-10T16:25:41Z", + "published": "2023-03-01T17:58:01Z", + "aliases": [ + "CVE-2022-1274" + ], + "summary": "HTML Injection in Keycloak Admin REST API", + "details": "The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-services" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "20.0.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/pull/16764" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" + }, + { + "type": "WEB", + "url": "https://herolab.usd.de/security-advisories/usd-2021-0033" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79", + "CWE-80" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2023-03-01T17:58:01Z", + "nvd_published_at": "2023-03-29T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/keycloak__keycloak_CVE-2022-3782_20.0.1.json b/advisory/keycloak__keycloak_CVE-2022-3782_20.0.1.json new file mode 100644 index 0000000000000000000000000000000000000000..cb82ca3e98a5b60e6ae4a8bdcdd69c37b8acf5f1 --- /dev/null +++ b/advisory/keycloak__keycloak_CVE-2022-3782_20.0.1.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g8q8-fggx-9r3q", + "modified": "2023-01-25T21:37:00Z", + "published": "2022-12-13T19:44:56Z", + "aliases": [ + "CVE-2022-3782" + ], + "summary": "Keycloak vulnerable to path traversal via double URL encoding ", + "details": "Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-parent" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "20.0.2" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 20.0.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-g8q8-fggx-9r3q" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/pull/15982/commits/1987c942f527b9f3bbf2a86ba71ba8ae0154ac37" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2022-3782" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-177", + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-12-13T19:44:56Z", + "nvd_published_at": "2023-01-13T06:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/keycloak__keycloak_CVE-2022-4137_20.0.4.json b/advisory/keycloak__keycloak_CVE-2022-4137_20.0.4.json new file mode 100644 index 0000000000000000000000000000000000000000..779b823835066cfd611b3771cc9c4e9c7816369b --- /dev/null +++ b/advisory/keycloak__keycloak_CVE-2022-4137_20.0.4.json @@ -0,0 +1,94 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9hhc-pj4w-w5rv", + "modified": "2023-09-26T13:59:05Z", + "published": "2023-03-01T17:38:56Z", + "aliases": [ + "CVE-2022-4137" + ], + "summary": "Keycloak Cross-site Scripting on OpenID connect login service", + "details": "A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-parent" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "20.0.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-9hhc-pj4w-w5rv" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4137" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/pull/16774" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/commit/30d0e9d22dae51392e5a3748a1c68c116667359a" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2023:1043" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2023:1044" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2023:1045" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2023:1049" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2022-4137" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148496" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-116", + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-03-01T17:38:56Z", + "nvd_published_at": "2023-09-25T20:15:09Z" + } +} \ No newline at end of file diff --git a/advisory/keycloak__keycloak_CVE-2022-4361_21.1.1.json b/advisory/keycloak__keycloak_CVE-2022-4361_21.1.1.json new file mode 100644 index 0000000000000000000000000000000000000000..2b5779b8b0e68f63276a07b0671f1594b3f608b6 --- /dev/null +++ b/advisory/keycloak__keycloak_CVE-2022-4361_21.1.1.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3p62-6fjh-3p5h", + "modified": "2023-07-07T21:47:57Z", + "published": "2023-06-30T20:30:50Z", + "aliases": [ + "CVE-2022-4361" + ], + "summary": "Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC", + "details": "AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).\n\nAssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-services" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "21.1.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4361" + }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151618" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79", + "CWE-81" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2023-06-30T20:30:50Z", + "nvd_published_at": "2023-07-07T20:15:09Z" + } +} \ No newline at end of file diff --git a/advisory/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json b/advisory/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json new file mode 100644 index 0000000000000000000000000000000000000000..9445d4e674e3ad08b0ec34025c6737204edf3edf --- /dev/null +++ b/advisory/kubernetes-client__java_CVE-2020-8570_client-java-parent-9.0.1.json @@ -0,0 +1,111 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cghx-9gcr-r42x", + "modified": "2022-10-07T20:36:09Z", + "published": "2021-01-29T18:12:54Z", + "aliases": [ + "CVE-2020-8570" + ], + "summary": "Path Traversal in the Java Kubernetes Client", + "details": "Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.kubernetes:client-java" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "9.0.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.kubernetes:client-java" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "10.0.0" + }, + { + "fixed": "10.0.1" + } + ] + } + ], + "versions": [ + "10.0.0" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8570" + }, + { + "type": "WEB", + "url": "https://github.com/kubernetes-client/java/issues/1491" + }, + { + "type": "WEB", + "url": "https://github.com/kubernetes-client/java/pull/1450" + }, + { + "type": "WEB", + "url": "https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589" + }, + { + "type": "PACKAGE", + "url": "https://github.com/kubernetes-client/java" + }, + { + "type": "WEB", + "url": "https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2021-01-22T18:25:27Z", + "nvd_published_at": "2021-01-21T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/nahsra__antisamy_CVE-2016-10006_1.5.3.json b/advisory/nahsra__antisamy_CVE-2016-10006_1.5.3.json new file mode 100644 index 0000000000000000000000000000000000000000..66f194fa59a7832bb62613705d18182b2f1b2f9a --- /dev/null +++ b/advisory/nahsra__antisamy_CVE-2016-10006_1.5.3.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-683w-6h9j-57wq", + "modified": "2021-09-01T22:41:27Z", + "published": "2018-10-18T17:21:47Z", + "aliases": [ + "CVE-2016-10006" + ], + "summary": "Moderate severity vulnerability that affects org.owasp.antisamy:antisamy", + "details": "In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.antisamy:antisamy" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.5.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10006" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/issues/2" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-683w-6h9j-57wq" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nahsra/antisamy" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/95101" + }, + { + "type": "WEB", + "url": "http://www.securitytracker.com/id/1037532" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:18:23Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/nahsra__antisamy_CVE-2017-14735_1.5.6.json b/advisory/nahsra__antisamy_CVE-2017-14735_1.5.6.json new file mode 100644 index 0000000000000000000000000000000000000000..1b8e8dfc334efdedd7747e41bddf786196315993 --- /dev/null +++ b/advisory/nahsra__antisamy_CVE-2017-14735_1.5.6.json @@ -0,0 +1,93 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q44v-xc3g-v7jq", + "modified": "2022-11-17T19:41:38Z", + "published": "2018-10-18T17:22:11Z", + "aliases": [ + "CVE-2017-14735" + ], + "summary": "OWASP AntiSamy Cross-site Scripting vulnerability", + "details": "OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.antisamy:antisamy" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.5.7" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14735" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/issues/10" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-q44v-xc3g-v7jq" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nahsra/antisamy" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" + }, + { + "type": "WEB", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/105656" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:50:52Z", + "nvd_published_at": "2017-09-25T21:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/nahsra__antisamy_CVE-2022-28367_1.6.5.json b/advisory/nahsra__antisamy_CVE-2022-28367_1.6.5.json new file mode 100644 index 0000000000000000000000000000000000000000..b469d6a6a503086ef62a294202e9c90652125497 --- /dev/null +++ b/advisory/nahsra__antisamy_CVE-2022-28367_1.6.5.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3pqg-4rqg-pg9g", + "modified": "2022-05-04T04:00:41Z", + "published": "2022-04-23T00:03:04Z", + "aliases": [ + "CVE-2022-28367" + ], + "summary": "Cross-site Scripting in OWASP AntiSamy", + "details": "OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.antisamy:antisamy" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.6.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28367" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nahsra/antisamy" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-04-26T19:45:44Z", + "nvd_published_at": "2022-04-21T23:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/nahsra__antisamy_CVE-2022-29577_1.6.6.1.json b/advisory/nahsra__antisamy_CVE-2022-29577_1.6.6.1.json new file mode 100644 index 0000000000000000000000000000000000000000..90cd009917ac0d8827738f22a6e389dbe2f0a677 --- /dev/null +++ b/advisory/nahsra__antisamy_CVE-2022-29577_1.6.6.1.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vp37-2f9p-3vr3", + "modified": "2022-05-04T03:59:45Z", + "published": "2022-04-23T00:03:04Z", + "aliases": [ + "CVE-2022-29577" + ], + "summary": "Cross-site Scripting in OWASP AntiSamy", + "details": "AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.owasp.antisamy:antisamy" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.6.7" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29577" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0" + }, + { + "type": "PACKAGE", + "url": "https://github.com/nahsra/antisamy" + }, + { + "type": "WEB", + "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.7" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-04-26T17:47:34Z", + "nvd_published_at": "2022-04-21T23:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/payara__Payara_CVE-2022-37422_5.2022.2.json b/advisory/payara__Payara_CVE-2022-37422_5.2022.2.json new file mode 100644 index 0000000000000000000000000000000000000000..ae1ad211a539a73a7e9dd0ccbe0cd9486cbd1731 --- /dev/null +++ b/advisory/payara__Payara_CVE-2022-37422_5.2022.2.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h28c-453m-h9xm", + "modified": "2022-08-30T20:20:37Z", + "published": "2022-08-19T00:00:20Z", + "aliases": [ + "CVE-2022-37422" + ], + "summary": "Path Traversal in Payara", + "details": "Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "fish.payara.api:payara-bom" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.2022.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37422" + }, + { + "type": "WEB", + "url": "https://blog.payara.fish/august-community-5-release" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-08-30T20:20:37Z", + "nvd_published_at": "2022-08-18T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/perwendel__spark_CVE-2016-9177_2.5.1.json b/advisory/perwendel__spark_CVE-2016-9177_2.5.1.json new file mode 100644 index 0000000000000000000000000000000000000000..338495ec001aabae0d2cd6eb39728abc1d7e6f45 --- /dev/null +++ b/advisory/perwendel__spark_CVE-2016-9177_2.5.1.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-89gc-6cw6-4vch", + "modified": "2022-04-26T18:36:08Z", + "published": "2018-10-04T19:53:35Z", + "aliases": [ + "CVE-2016-9177" + ], + "summary": "Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI", + "details": "Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.sparkjava:spark-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.5.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9177" + }, + { + "type": "WEB", + "url": "https://github.com/perwendel/spark/issues/700" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2017:0868" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-89gc-6cw6-4vch" + }, + { + "type": "PACKAGE", + "url": "https://github.com/perwendel/spark" + }, + { + "type": "WEB", + "url": "http://seclists.org/fulldisclosure/2016/Nov/13" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/94218" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:25:07Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/perwendel__spark_CVE-2018-9159_2.7.1.json b/advisory/perwendel__spark_CVE-2018-9159_2.7.1.json new file mode 100644 index 0000000000000000000000000000000000000000..0f2d3de06c66d681dcb7dd8c76dec3041e9519a5 --- /dev/null +++ b/advisory/perwendel__spark_CVE-2018-9159_2.7.1.json @@ -0,0 +1,89 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76qr-mmh8-cp8f", + "modified": "2021-09-02T19:24:32Z", + "published": "2018-10-19T16:56:00Z", + "aliases": [ + "CVE-2018-9159" + ], + "summary": "Moderate severity vulnerability that affects com.sparkjava:spark-core", + "details": "In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.sparkjava:spark-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.7.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9159" + }, + { + "type": "WEB", + "url": "https://github.com/perwendel/spark/issues/981" + }, + { + "type": "WEB", + "url": "https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668" + }, + { + "type": "WEB", + "url": "https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd" + }, + { + "type": "WEB", + "url": "https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:2020" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:2405" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-76qr-mmh8-cp8f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/perwendel/spark" + }, + { + "type": "WEB", + "url": "http://sparkjava.com/news#spark-272-released" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:21:39Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/rhuss__jolokia_CVE-2018-1000129_1.4.0.json b/advisory/rhuss__jolokia_CVE-2018-1000129_1.4.0.json new file mode 100644 index 0000000000000000000000000000000000000000..4607df017d921f9409cc86756e80551090475cfe --- /dev/null +++ b/advisory/rhuss__jolokia_CVE-2018-1000129_1.4.0.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hfpg-gqjw-779m", + "modified": "2022-06-30T18:25:33Z", + "published": "2022-05-14T01:27:45Z", + "aliases": [ + "CVE-2018-1000129" + ], + "summary": "Cross-site Scripting in Jolokia agent", + "details": "An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.jolokia:jolokia-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.3.7" + }, + { + "fixed": "1.5.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000129" + }, + { + "type": "WEB", + "url": "https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:2669" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:3817" + }, + { + "type": "PACKAGE", + "url": "https://github.com/rhuss/jolokia" + }, + { + "type": "WEB", + "url": "https://github.com/rhuss/jolokia/releases/tag/v1.5.0" + }, + { + "type": "WEB", + "url": "https://jolokia.org/#Security_fixes_with_1.5.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-06-30T18:25:33Z", + "nvd_published_at": "2018-03-14T13:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json b/advisory/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json new file mode 100644 index 0000000000000000000000000000000000000000..b175640e30f5371459e19a2fe336528c7020128e --- /dev/null +++ b/advisory/spring-cloud__spring-cloud-config_CVE-2020-5405_2.1.6.RELEASE.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g86w-v5vg-9gxf", + "modified": "2021-08-25T22:01:25Z", + "published": "2020-06-05T16:11:36Z", + "aliases": [ + "CVE-2020-5405" + ], + "summary": "Directory traversal attack in Spring Cloud Config", + "details": "Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-config-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.1.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-config-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.2.0" + }, + { + "fixed": "2.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5405" + }, + { + "type": "PACKAGE", + "url": "https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server" + }, + { + "type": "WEB", + "url": "https://pivotal.io/security/cve-2020-5405" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-23" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-04T19:06:58Z", + "nvd_published_at": "2020-03-05T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json b/advisory/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json new file mode 100644 index 0000000000000000000000000000000000000000..b94bf89fd82295f579189bcf39aa5ea8b97a84c2 --- /dev/null +++ b/advisory/spring-cloud__spring-cloud-config_CVE-2020-5410_2.1.8.RELEASE.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-32xf-jwmv-9hf3", + "modified": "2022-09-21T19:31:46Z", + "published": "2020-06-05T16:13:20Z", + "aliases": [ + "CVE-2020-5410" + ], + "summary": "Directory traversal attack in Spring Cloud Config", + "details": "Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-config-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.1.0" + }, + { + "fixed": "2.1.9" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-config-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.2.0" + }, + { + "fixed": "2.2.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410" + }, + { + "type": "PACKAGE", + "url": "https://github.com/spring-cloud/spring-cloud-config" + }, + { + "type": "WEB", + "url": "https://tanzu.vmware.com/security/cve-2020-5410" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-23" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-04T19:07:50Z", + "nvd_published_at": "2020-06-02T17:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json b/advisory/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json new file mode 100644 index 0000000000000000000000000000000000000000..c31399413a15e96541fa9d7235c6bbfc63e30699 --- /dev/null +++ b/advisory/spring-cloud__spring-cloud-gateway_CVE-2022-22947_3.0.6.json @@ -0,0 +1,93 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3gx9-37ww-9qw6", + "modified": "2022-08-11T21:37:05Z", + "published": "2022-03-04T00:00:15Z", + "aliases": [ + "CVE-2022-22947" + ], + "summary": "Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured", + "details": "In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-gateway" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.0.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.cloud:spring-cloud-gateway" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.1.0" + }, + { + "fixed": "3.1.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22947" + }, + { + "type": "WEB", + "url": "https://tanzu.vmware.com/security/cve-2022-22947" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-917", + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-03-04T21:06:22Z", + "nvd_published_at": "2022-03-03T22:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json b/advisory/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json new file mode 100644 index 0000000000000000000000000000000000000000..b4f1a2718611dcb48eaafd387e1517c23cee9f0e --- /dev/null +++ b/advisory/spring-projects__spring-framework_CVE-2022-22965_5.2.19.RELEASE.json @@ -0,0 +1,285 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-36p3-wjmg-h94x", + "modified": "2022-06-01T22:15:49Z", + "published": "2022-03-31T18:30:50Z", + "aliases": [ + "CVE-2022-22965" + ], + "summary": "Remote Code Execution in Spring Framework", + "details": "Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. \n\n## Impact\n\nA Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.\n\nThese are the prerequisites for the exploit:\n- JDK 9 or higher\n- Apache Tomcat as the Servlet container\n- Packaged as WAR\n- `spring-webmvc` or `spring-webflux` dependency\n\n## Patches\n\n- Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE)\n- Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12)\n\n## Workarounds\n\nFor those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting.\n\nTo apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-beans" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.2.20.RELEASE" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-beans" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.3.0" + }, + { + "fixed": "5.3.18" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-webmvc" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.2.20.RELEASE" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-webmvc" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.3.0" + }, + { + "fixed": "5.3.18" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.boot:spring-boot-starter-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.5.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.boot:spring-boot-starter-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.6.0" + }, + { + "fixed": "2.6.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-webflux" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.2.20.RELEASE" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework:spring-webflux" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.3.0" + }, + { + "fixed": "5.3.18" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.boot:spring-boot-starter-webflux" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.5.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.boot:spring-boot-starter-webflux" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.6.0" + }, + { + "fixed": "2.6.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965" + }, + { + "type": "WEB", + "url": "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15" + }, + { + "type": "WEB", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf" + }, + { + "type": "WEB", + "url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12" + }, + { + "type": "WEB", + "url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/spring-projects/spring-framework" + }, + { + "type": "WEB", + "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE" + }, + { + "type": "WEB", + "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18" + }, + { + "type": "WEB", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005" + }, + { + "type": "WEB", + "url": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement" + }, + { + "type": "WEB", + "url": "https://tanzu.vmware.com/security/cve-2022-22965" + }, + { + "type": "WEB", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html" + }, + { + "type": "WEB", + "url": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74", + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2022-03-31T18:30:50Z", + "nvd_published_at": "2022-04-01T23:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json b/advisory/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json new file mode 100644 index 0000000000000000000000000000000000000000..c83d8b7899dc7e420511f55dae63b90c6d98f228 --- /dev/null +++ b/advisory/spring-projects__spring-security_CVE-2011-2732_2.0.6.RELEASE.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5xm9-rf63-wj7h", + "modified": "2022-07-13T17:56:38Z", + "published": "2022-05-17T05:18:15Z", + "aliases": [ + "CVE-2011-2732" + ], + "summary": "Improper Control of Generation of Code in Spring Security", + "details": "CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security:spring-security-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.0.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.springframework.security:spring-security-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.0.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2732" + }, + { + "type": "PACKAGE", + "url": "https://github.com/spring-projects/spring-security" + }, + { + "type": "WEB", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814" + }, + { + "type": "WEB", + "url": "http://support.springsource.com/security/cve-2011-2732" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-07-13T17:56:38Z", + "nvd_published_at": "2012-12-05T17:55:00Z" + } +} \ No newline at end of file diff --git a/advisory/square__retrofit_CVE-2018-1000850_2.4.0.json b/advisory/square__retrofit_CVE-2018-1000850_2.4.0.json new file mode 100644 index 0000000000000000000000000000000000000000..7d24530b551d3b29f94ee7afaa41c76b65904734 --- /dev/null +++ b/advisory/square__retrofit_CVE-2018-1000850_2.4.0.json @@ -0,0 +1,89 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8p8g-f9vg-r7xr", + "modified": "2022-09-14T22:25:15Z", + "published": "2018-12-21T17:48:19Z", + "aliases": [ + "CVE-2018-1000850" + ], + "summary": "Directory Traversal vulnerability in Square Retrofit", + "details": "Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.squareup.retrofit2:retrofit" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "fixed": "2.5.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" + }, + { + "type": "WEB", + "url": "https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2019:3892" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-8p8g-f9vg-r7xr" + }, + { + "type": "PACKAGE", + "url": "https://github.com/square/retrofit" + }, + { + "type": "WEB", + "url": "https://github.com/square/retrofit/blob/master/CHANGELOG.md" + }, + { + "type": "WEB", + "url": "https://ihacktoprotect.com/post/retrofit-path-traversal" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:26:16Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json b/advisory/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json new file mode 100644 index 0000000000000000000000000000000000000000..639b725edca84ab9cd690eaaf7143f88548e5802 --- /dev/null +++ b/advisory/srikanth-lingala__zip4j_CVE-2018-1002202_1.3.2.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2rpm-4x8c-pvqg", + "modified": "2022-06-30T14:43:07Z", + "published": "2022-05-13T01:35:04Z", + "aliases": [ + "CVE-2018-1002202" + ], + "summary": "Improper Limitation of a Pathname to a Restricted Directory in Zip4j", + "details": "zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "net.lingala.zip4j:zip4j" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.3.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002202" + }, + { + "type": "WEB", + "url": "https://github.com/snyk/zip-slip-vulnerability" + }, + { + "type": "WEB", + "url": "https://snyk.io/research/zip-slip-vulnerability" + }, + { + "type": "WEB", + "url": "https://snyk.io/vuln/SNYK-JAVA-NETLINGALAZIP4J-31679" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03895en_us" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-06-30T14:43:07Z", + "nvd_published_at": "2018-07-25T17:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/testng-team__testng_CVE-2022-4065_7.5.json b/advisory/testng-team__testng_CVE-2022-4065_7.5.json new file mode 100644 index 0000000000000000000000000000000000000000..eb9b578bd5967286954256e1bcfd6951686d1a28 --- /dev/null +++ b/advisory/testng-team__testng_CVE-2022-4065_7.5.json @@ -0,0 +1,112 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rc2q-x9mf-w3vf", + "modified": "2023-05-09T17:53:32Z", + "published": "2022-11-19T21:30:25Z", + "aliases": [ + "CVE-2022-4065" + ], + "summary": "TestNG is vulnerable to Path Traversal", + "details": "### Impact\n\nAffected by this vulnerability is the function `testngXmlExistsInJar` of the file `testng-core/src/main/java/org/testng/JarFileUtils.java` of the component `XML File Parser`.\n\nThe manipulation leads to path traversal only for `.xml`, `.yaml` and `.yml` files by default. The attack implies running an unsafe test JAR. However since that JAR can also contain executable code itself, the path traversal is unlikely to be the main attack.\n\n### Patches\n\nA patch is available in [version 7.7.0](https://github.com/cbeust/testng/releases/tag/7.7.0) at commit 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The patch was pushed into the master branch but no releases have yet been made with the patch included.\n\nA backport of the fix is available in [version 7.5.1]((https://github.com/cbeust/testng/releases/tag/7.5.1) for Java 8 projects.\n\n### Workaround\n\n* Specify which tests to run when invoking TestNG by configuring them on the CLI or in the build tool controlling the run.\n* Do not run tests with untrusted JARs on the classpath, this includes pull requests on open source projects.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.testng:testng" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.13" + }, + { + "fixed": "7.5.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.testng:testng" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "7.6.0" + }, + { + "fixed": "7.7.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4065" + }, + { + "type": "WEB", + "url": "https://github.com/cbeust/testng/pull/1596" + }, + { + "type": "WEB", + "url": "https://github.com/cbeust/testng/pull/2806" + }, + { + "type": "WEB", + "url": "https://github.com/testng-team/testng/pull/2899" + }, + { + "type": "WEB", + "url": "https://github.com/cbeust/testng/commit/9150736cd2c123a6a3b60e6193630859f9f0422b" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cbeust/testng" + }, + { + "type": "WEB", + "url": "https://github.com/cbeust/testng/releases/tag/7.7.0" + }, + { + "type": "WEB", + "url": "https://github.com/cbeust/testng/releases/tag/7.7.1" + }, + { + "type": "WEB", + "url": "https://github.com/testng-team/testng/releases/tag/7.5.1" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.214027" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.214027" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-12-02T22:31:06Z", + "nvd_published_at": "2022-11-19T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json b/advisory/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json new file mode 100644 index 0000000000000000000000000000000000000000..c8b67b791bbeebd194be1d0565e594c6d46790d7 --- /dev/null +++ b/advisory/undertow-io__undertow_CVE-2014-7816_1.0.16.Final.json @@ -0,0 +1,114 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h6p6-fc4w-cqhx", + "modified": "2022-07-06T21:05:00Z", + "published": "2022-05-17T04:15:16Z", + "aliases": [ + "CVE-2014-7816" + ], + "summary": "Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow", + "details": "Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.undertow:undertow-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "1.0.17" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.undertow:undertow-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.1.0.Beta1" + }, + { + "fixed": "1.1.0.CR5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.1.0.CR4" + } + }, + { + "package": { + "ecosystem": "Maven", + "name": "io.undertow:undertow-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.2.0.Beta1" + }, + { + "fixed": "1.2.0.Beta3" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.2.0.Beta2" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7816" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157478" + }, + { + "type": "WEB", + "url": "https://issues.jboss.org/browse/UNDERTOW-338" + }, + { + "type": "WEB", + "url": "https://issues.jboss.org/browse/WFLY-4020" + }, + { + "type": "WEB", + "url": "http://seclists.org/oss-sec/2014/q4/830" + }, + { + "type": "WEB", + "url": "http://www.securityfocus.com/bid/71328" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2022-07-06T21:05:00Z", + "nvd_published_at": "2014-12-01T15:59:00Z" + } +} \ No newline at end of file diff --git a/advisory/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json b/advisory/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json new file mode 100644 index 0000000000000000000000000000000000000000..3462767fd4f5899850620dfead70c4f0fc9a4ced --- /dev/null +++ b/advisory/vert-x3__vertx-web_CVE-2018-12542_3.5.3.CR1.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h39x-m55c-v55h", + "modified": "2022-04-26T21:49:59Z", + "published": "2018-10-17T16:20:45Z", + "aliases": [ + "CVE-2018-12542" + ], + "summary": "Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location", + "details": "In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.vertx:vertx-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.5.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12542" + }, + { + "type": "WEB", + "url": "https://github.com/vert-x3/vertx-web/issues/1025" + }, + { + "type": "WEB", + "url": "https://github.com/vert-x3/vertx-web/commit/57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b" + }, + { + "type": "WEB", + "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-h39x-m55c-v55h" + }, + { + "type": "PACKAGE", + "url": "https://github.com/vert-x3/vertx-web" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T21:38:32Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisory/vert-x3__vertx-web_CVE-2019-17640_3.9.3.json b/advisory/vert-x3__vertx-web_CVE-2019-17640_3.9.3.json new file mode 100644 index 0000000000000000000000000000000000000000..b03b329c4f7d6363ed52cb4edd88eebfcd3ddc23 --- /dev/null +++ b/advisory/vert-x3__vertx-web_CVE-2019-17640_3.9.3.json @@ -0,0 +1,86 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vjw7-6gfq-6wf5", + "modified": "2021-04-22T22:08:15Z", + "published": "2022-02-10T20:28:57Z", + "aliases": [ + "CVE-2019-17640" + ], + "summary": "Path Traversal in Eclipse Vert", + "details": "In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.vertx:vertx-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.9.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17640" + }, + { + "type": "WEB", + "url": "https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4" + }, + { + "type": "WEB", + "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://mvnrepository.com/artifact/io.vertx/vertx-web" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-23" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2021-04-22T22:08:15Z", + "nvd_published_at": "2020-10-15T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/whitesource__curekit_CVE-2022-23082_1.1.3.json b/advisory/whitesource__curekit_CVE-2022-23082_1.1.3.json new file mode 100644 index 0000000000000000000000000000000000000000..adeab0b3386591a70a6c98152f63ad3f36c61c13 --- /dev/null +++ b/advisory/whitesource__curekit_CVE-2022-23082_1.1.3.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m9vj-44f3-78xw", + "modified": "2022-06-03T15:46:13Z", + "published": "2022-06-01T00:00:35Z", + "aliases": [ + "CVE-2022-23082" + ], + "summary": "Path traversal in CureKit", + "details": "CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "io.whitesource:curekit" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.1" + }, + { + "fixed": "1.1.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23082" + }, + { + "type": "WEB", + "url": "https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/whitesource/CureKit" + }, + { + "type": "WEB", + "url": "https://www.mend.io/vulnerability-database/CVE-2022-23082" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-06-03T15:45:42Z", + "nvd_published_at": "2022-05-31T15:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json b/advisory/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json new file mode 100644 index 0000000000000000000000000000000000000000..44355c0368bdf9d8af61777133566fddffd44de2 --- /dev/null +++ b/advisory/wildfly__wildfly_CVE-2018-1047_11.0.0.Final.json @@ -0,0 +1,90 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmr4-w67p-vh8x", + "modified": "2023-02-13T20:36:36Z", + "published": "2018-10-19T16:55:35Z", + "aliases": [ + "CVE-2018-1047" + ], + "summary": "Improper Input Validation in org.wildfly:wildfly-undertow", + "details": "A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.wildfly:wildfly-undertow" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "12.0.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1047" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1247" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1248" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1249" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:1251" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2018:2938" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2018-1047" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528361" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-fmr4-w67p-vh8x" + }, + { + "type": "WEB", + "url": "https://issues.jboss.org/browse/WFLY-9620" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20", + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2020-06-16T20:49:32Z", + "nvd_published_at": "2018-01-24T23:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/x-stream__xstream_CVE-2013-7285_1.4.6.json b/advisory/x-stream__xstream_CVE-2013-7285_1.4.6.json new file mode 100644 index 0000000000000000000000000000000000000000..2173ad9f6a13e60a4c34ee9c6030569499bc1a06 --- /dev/null +++ b/advisory/x-stream__xstream_CVE-2013-7285_1.4.6.json @@ -0,0 +1,116 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f554-x222-wgf7", + "modified": "2024-03-04T23:51:42Z", + "published": "2019-05-29T18:05:03Z", + "aliases": [ + "CVE-2013-7285" + ], + "summary": "Command Injection in Xstream", + "details": "Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.thoughtworks.xstream:xstream" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.4.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "com.thoughtworks.xstream:xstream" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.4.10" + }, + { + "fixed": "1.4.11" + } + ] + } + ], + "versions": [ + "1.4.10" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285" + }, + { + "type": "WEB", + "url": "https://github.com/x-stream/xstream/commit/6344867dce6767af7d0fe34fb393271a6456672d" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html" + }, + { + "type": "WEB", + "url": "https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "type": "WEB", + "url": "https://x-stream.github.io/CVE-2013-7285.html" + }, + { + "type": "WEB", + "url": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" + }, + { + "type": "WEB", + "url": "http://seclists.org/oss-sec/2014/q1/69" + }, + { + "type": "WEB", + "url": "http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77", + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2019-05-15T23:13:58Z", + "nvd_published_at": "2019-05-15T17:29:00Z" + } +} \ No newline at end of file diff --git a/advisory/x-stream__xstream_CVE-2020-26217_1.4.14-java7.json b/advisory/x-stream__xstream_CVE-2020-26217_1.4.14-java7.json new file mode 100644 index 0000000000000000000000000000000000000000..ce36649f7d8600e1121bc7e8ed5ddd3a929dcd41 --- /dev/null +++ b/advisory/x-stream__xstream_CVE-2020-26217_1.4.14-java7.json @@ -0,0 +1,120 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mw36-7c6c-q4q2", + "modified": "2022-02-08T22:03:00Z", + "published": "2020-11-16T20:07:59Z", + "aliases": [ + "CVE-2020-26217" + ], + "summary": "XStream can be used for Remote Code Execution", + "details": "### Impact\nThe vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.\n\n### Patches\nIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.\n\n### Workarounds\nNo user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.\n\nUsers of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.\n\nUsers of XStream 1.4.13 can simply add two lines to XStream's setup code:\n```Java\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });\n```\nUsers of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.\n```Java\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });\n```\nUsers of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:\n```Java\nxstream.registerConverter(new Converter() {\n public boolean canConvert(Class type) {\n return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals(\"javax.imageio.ImageIO$ContainsFilter\") || Proxy.isProxy(type));\n }\n\n public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n\n public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n}, XStream.PRIORITY_LOW);\n```\n\n### Credits\nChen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.\n\n### References\nSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)\n* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.thoughtworks.xstream:xstream" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.4.14-jdk7" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.4.13" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26217" + }, + { + "type": "WEB", + "url": "https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a" + }, + { + "type": "WEB", + "url": "https://x-stream.github.io/CVE-2020-26217.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "type": "WEB", + "url": "https://www.debian.org/security/2020/dsa-4811" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20210409-0004" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E" + }, + { + "type": "PACKAGE", + "url": "https://github.com/x-stream/xstream" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2020-11-16T20:06:06Z", + "nvd_published_at": "2020-11-16T21:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/x-stream__xstream_CVE-2021-21345_1.4.15.json b/advisory/x-stream__xstream_CVE-2021-21345_1.4.15.json new file mode 100644 index 0000000000000000000000000000000000000000..712ae754bb5f655b701ed0d29c74fc4093f3e2e4 --- /dev/null +++ b/advisory/x-stream__xstream_CVE-2021-21345_1.4.15.json @@ -0,0 +1,122 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hwpc-8xqv-jvj4", + "modified": "2022-10-25T20:37:12Z", + "published": "2021-03-22T23:28:38Z", + "aliases": [ + "CVE-2021-21345" + ], + "summary": "XStream is vulnerable to a Remote Command Execution attack", + "details": "### Impact\nThe vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.\n\n### Patches\nIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.\n\n### Workarounds\nSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.\n\n### References\nSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html).\n\n### Credits\n钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)\n* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.thoughtworks.xstream:xstream" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.4.16" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21345" + }, + { + "type": "WEB", + "url": "https://x-stream.github.io/security.html#workaround" + }, + { + "type": "WEB", + "url": "https://x-stream.github.io/CVE-2021-21345.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "type": "WEB", + "url": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "type": "WEB", + "url": "https://www.debian.org/security/2021/dsa-5004" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/ntap-20210430-0002" + }, + { + "type": "WEB", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB" + }, + { + "type": "WEB", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7" + }, + { + "type": "WEB", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E" + }, + { + "type": "PACKAGE", + "url": "https://github.com/x-stream/xstream" + }, + { + "type": "WEB", + "url": "http://x-stream.github.io/changes.html#1.4.16" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78", + "CWE-94" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-03-22T23:24:01Z", + "nvd_published_at": "2021-03-23T00:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json b/advisory/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json new file mode 100644 index 0000000000000000000000000000000000000000..ce3e64953412d26adf0821044369e222f34c503e --- /dev/null +++ b/advisory/xerial__sqlite-jdbc_CVE-2023-32697_3.41.2.1.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6phf-6h5g-97j2", + "modified": "2023-06-02T22:05:04Z", + "published": "2023-05-23T20:07:58Z", + "aliases": [ + "CVE-2023-32697" + ], + "summary": "Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled", + "details": "## Summary\n\nSqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. \n\n## Impacted versions : \n\n3.6.14.1-3.41.2.1\n \n## References\n\nhttps://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.xerial:sqlite-jdbc" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.6.14.1" + }, + { + "fixed": "3.41.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32697" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xerial/sqlite-jdbc" + }, + { + "type": "WEB", + "url": "https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2023-05-23T20:07:58Z", + "nvd_published_at": "2023-05-23T23:15:09Z" + } +} \ No newline at end of file diff --git a/advisory/xuxueli__xxl-job_CVE-2020-29204_2.2.0.json b/advisory/xuxueli__xxl-job_CVE-2020-29204_2.2.0.json new file mode 100644 index 0000000000000000000000000000000000000000..907f74d3e7cf23855c64eb623afe0e4eea6cdb51 --- /dev/null +++ b/advisory/xuxueli__xxl-job_CVE-2020-29204_2.2.0.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wc73-w5r9-x9pc", + "modified": "2021-10-08T22:07:01Z", + "published": "2021-10-12T16:41:36Z", + "aliases": [ + "CVE-2020-29204" + ], + "summary": "Cross-site Scripting in XXL-JOB", + "details": "XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "com.xuxueli:xxl-job-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.3.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29204" + }, + { + "type": "WEB", + "url": "https://github.com/xuxueli/xxl-job/issues/2083" + }, + { + "type": "WEB", + "url": "https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xuxueli/xxl-job" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2021-10-08T22:07:01Z", + "nvd_published_at": "2020-12-27T06:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json b/advisory/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json new file mode 100644 index 0000000000000000000000000000000000000000..d73da85f25275aed1df798db2be112415ed608a2 --- /dev/null +++ b/advisory/xwiki__xwiki-commons_CVE-2022-24897_12.6.6.json @@ -0,0 +1,93 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvx5-m8vg-vxgc", + "modified": "2022-04-28T21:16:40Z", + "published": "2022-04-28T21:16:40Z", + "aliases": [ + "CVE-2022-24897" + ], + "summary": "Arbitrary filesystem write access from velocity.", + "details": "### Impact\n\nThe velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. \n\n### Patches\nThe problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1.\n\n### Workarounds\nThere's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.\n\n### References\nhttps://jira.xwiki.org/browse/XWIKI-5168\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki](https://jira.xwiki.org)\n* Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.commons:xwiki-commons-velocity" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.3.0" + }, + { + "fixed": "12.6.7" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.commons:xwiki-commons-velocity" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "12.7.0" + }, + { + "fixed": "12.10.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24897" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-commons/pull/127" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xwiki/xwiki-commons" + }, + { + "type": "WEB", + "url": "https://jira.xwiki.org/browse/XWIKI-5168" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22", + "CWE-668" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2022-04-28T21:16:40Z", + "nvd_published_at": "2022-05-02T22:15:00Z" + } +} \ No newline at end of file diff --git a/advisory/xwiki__xwiki-commons_CVE-2023-29201_14.6.json b/advisory/xwiki__xwiki-commons_CVE-2023-29201_14.6.json new file mode 100644 index 0000000000000000000000000000000000000000..8e7178513e3814d77fc8dc7e41a5c1b1b67ad685 --- /dev/null +++ b/advisory/xwiki__xwiki-commons_CVE-2023-29201_14.6.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m3jr-cvhj-f35j", + "modified": "2023-04-25T21:00:29Z", + "published": "2023-04-12T20:38:17Z", + "aliases": [ + "CVE-2023-29201" + ], + "summary": "org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability", + "details": "### Impact\nThe \"restricted\" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `