schema_version
string
id
string
modified
timestamp[s]
published
timestamp[s]
aliases
sequence
summary
string
details
string
severity
list
affected
list
references
list
database_specific
dict
1.4.0
GHSA-m4fv-gm5m-4725
2023-04-10T16:25:41
2023-03-01T17:58:01
[ "CVE-2022-1274" ]
HTML Injection in Keycloak Admin REST API
The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.keycloak:keycloak-services" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "20.0.5" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/pull/16764" }, { "type": "WEB", "url": "https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157" }, { "type": "PACKAGE", "url": "https://github.com/keycloak/keycloak" }, { "type": "WEB", "url": "https://herolab.usd.de/security-advisories/usd-2021-0033" } ]
{ "cwe_ids": [ "CWE-79", "CWE-80" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-03-01T17:58:01", "nvd_published_at": "2023-03-29T21:15:00" }
1.4.0
GHSA-8vhq-qq4p-grq3
2022-07-01T21:47:32
2022-05-13T01:11:53
[ "CVE-2017-1000487" ]
OS Command Injection in Plexus-utils
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.codehaus.plexus:plexus-utils" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.0.16" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000487" }, { "type": "WEB", "url": "https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "type": "PACKAGE", "url": "https://github.com/codehaus-plexus/plexus-utils" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4146" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4149" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-07-01T21:47:32", "nvd_published_at": "2018-01-03T20:29:00" }
1.4.0
GHSA-w3x5-427h-wfq6
2022-12-09T20:19:32
2022-12-09T20:19:32
[ "CVE-2022-46166" ]
Spring Boot Admins integrated notifier support allows arbitrary code execution
### Impact All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected. ### Patches In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection). ### Workarounds * Disable any notifier * Disable write access (POST request) on `/env` actuator endpoint
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "de.codecentric:spring-boot-admin" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.6.10" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "de.codecentric:spring-boot-admin" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.7.0", "fixed": null }, { "introduced": null, "fixed": "2.7.8" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "de.codecentric:spring-boot-admin" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.0.0-M1", "fixed": null }, { "introduced": null, "fixed": "3.0.0-M6" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6" }, { "type": "PACKAGE", "url": "https://github.com/codecentric/spring-boot-admin" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-12-09T20:19:32", "nvd_published_at": "2022-12-09T21:15:00" }
1.4.0
GHSA-4m9r-5gqp-7j82
2021-06-11T14:37:55
2018-10-19T16:52:06
[ "CVE-2016-10726" ]
High severity vulnerability that affects org.dspace:dspace-xmlui
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-xmlui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.0", "fixed": null }, { "introduced": null, "fixed": "4.5" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-xmlui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0", "fixed": null }, { "introduced": null, "fixed": "5.5" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.dspace:dspace-xmlui" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.6" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726" }, { "type": "WEB", "url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82" }, { "type": "WEB", "url": "https://jira.duraspace.org/browse/DS-3094" }, { "type": "WEB", "url": "https://wiki.duraspace.org/display/DSDOC5x/Release+Notes" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T20:58:34", "nvd_published_at": null }
1.4.0
GHSA-mjmq-gwgm-5qhm
2023-12-07T18:20:03
2023-07-10T18:30:49
[ "CVE-2023-35887" ]
Apache MINA SSHD information disclosure vulnerability
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3 Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-common" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduced": null, "fixed": "2.9.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-sftp" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0.0", "fixed": null }, { "introduced": null, "fixed": "2.9.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.sshd:sshd-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.0.0", "fixed": null }, { "introduced": null, "fixed": "2.1.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/pull/362" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0" }, { "type": "WEB", "url": "https://github.com/apache/mina-sshd/commit/c20739b43aab0f7bf2ccad982a6cb37b9d5a8a0b" }, { "type": "PACKAGE", "url": "https://github.com/apache/mina-sshd" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/SSHD-1324" }, { "type": "WEB", "url": "https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2" } ]
{ "cwe_ids": [ "CWE-200", "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-07-10T21:53:01", "nvd_published_at": "2023-07-10T16:15:53" }
1.4.0
GHSA-cvx5-m8vg-vxgc
2022-04-28T21:16:40
2022-04-28T21:16:40
[ "CVE-2022-24897" ]
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ### Patches The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights. ### References https://jira.xwiki.org/browse/XWIKI-5168 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [XWiki Security mailing-list](mailto:[email protected])
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-velocity" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.3.0", "fixed": null }, { "introduced": null, "fixed": "12.6.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-velocity" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "12.7.0", "fixed": null }, { "introduced": null, "fixed": "12.10.3" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24897" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/pull/127" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-commons" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-5168" } ]
{ "cwe_ids": [ "CWE-22", "CWE-668" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-04-28T21:16:40", "nvd_published_at": "2022-05-02T22:15:00" }
1.4.0
GHSA-jc7h-c423-mpjc
2024-01-22T21:32:36
2024-01-15T12:30:19
[ "CVE-2023-46749" ]
Apache Shiro vulnerable to path traversal
Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.shiro:shiro-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.13.0" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.shiro:shiro-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0alpha1", "fixed": null }, { "introduced": null, "fixed": "2.0.0-alpha4" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749" }, { "type": "WEB", "url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-16T20:34:50", "nvd_published_at": "2024-01-15T10:15:26" }
1.4.0
GHSA-7wfc-x4f7-gg2x
2022-03-18T17:58:01
2022-03-18T17:58:01
[ "CVE-2021-30180" ]
Code injection in Apache Dubbo
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.dubbo:dubbo" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.7.0", "fixed": null }, { "introduced": null, "fixed": "2.7.10" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E" } ]
{ "cwe_ids": [ "CWE-444", "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-06-02T20:19:48", "nvd_published_at": "2021-06-01T14:15:00" }
1.4.0
GHSA-395w-qhqr-9fr6
2021-01-06T20:01:15
2021-01-06T20:01:34
[ "CVE-2020-17519" ]
Path Traversal in Apache Flink
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
[]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.flink:flink-runtime_2.11" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.11.0", "fixed": null }, { "introduced": null, "fixed": "1.11.3" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.flink:flink-runtime_2.12" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.11.0", "fixed": null }, { "introduced": null, "fixed": "1.11.3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/01/05/2" } ]
{ "cwe_ids": [ "CWE-22", "CWE-552" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-01-06T20:01:15", "nvd_published_at": "2021-01-05T12:15:00" }
1.4.0
GHSA-rhq2-2574-78mc
2022-04-27T14:42:53
2018-10-17T19:54:53
[ "CVE-2018-17297" ]
Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "cn.hutool:hutool-parent" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.1.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "cn.hutool:hutool-all" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.1.12" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "cn.hutool:hutool-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.1.12" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17297" }, { "type": "WEB", "url": "https://github.com/looly/hutool/issues/162" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rhq2-2574-78mc" }, { "type": "PACKAGE", "url": "https://github.com/looly/hutool" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:55:00", "nvd_published_at": null }
1.4.0
GHSA-h2rq-qhr7-53gm
2024-02-14T14:52:14
2024-02-06T12:30:30
[ "CVE-2024-23673" ]
Apache Sling Servlets Resolver executes malicious code via path traversal
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system. If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.  Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.sling:org.apache.sling.servlets.resolver" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "2.11.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673" }, { "type": "WEB", "url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e" }, { "type": "PACKAGE", "url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver" }, { "type": "WEB", "url": "https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/06/1" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-02-06T18:24:31", "nvd_published_at": "2024-02-06T10:15:08" }
1.4.0
GHSA-gpq8-963w-8qc9
2023-07-20T14:54:54
2023-07-12T12:31:36
[ "CVE-2023-37582" ]
RocketMQ NameServer component Code Injection vulnerability
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-namesrv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "4.9.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.rocketmq:rocketmq-namesrv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.0.0", "fixed": null }, { "introduced": null, "fixed": "5.1.2" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582" }, { "type": "PACKAGE", "url": "https://github.com/apache/rocketmq" }, { "type": "WEB", "url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/07/12/1" } ]
{ "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-07-12T17:30:39", "nvd_published_at": "2023-07-12T10:15:11" }
1.4.0
GHSA-c28r-hw5m-5gv3
2022-08-05T00:22:25
2022-07-15T20:44:55
[ "CVE-2022-31159" ]
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
### Overview A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. Versions of the AWS Java SDK for S3 v1 before and including v1.12.260 are affected by this issue. ### Impact If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. #### Root Cause The `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` contains a partial-path traversal vulnerability. This is due to the guard logic in `leavesRoot` containing an insufficient protection against partial-path traversal. https://github.com/aws/aws-sdk-java/blob/5be0807af763b9fbf6b0a153c76dd305e407f035/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1513-L1519 The application controls the `localBaseDirectory` argument, but the `key` comes from the AWS bucket entry (ie. can be attacker controlled). The above bit of logic can be bypassed with the following payloads: ```java // The following will return 'false', although the attacker value will "leave" the `/usr/foo` directory leavesRoot(new File("/usr/foo"), "/../foo-bar/bar") ``` This guard is used here which should guard against path traversal, however `leavesRoot` is an insufficient guard: https://github.com/aws/aws-sdk-java/blob/ae88c8aa4b195047b94c154897475f85642d7eb3/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1420-L1423 #### True Root cause If the result of `parent.getCanonicalPath()` is not slash terminated it allows for partial path traversal. > Consider `"/usr/outnot".startsWith("/usr/out")`. The check is bypassed although `outnot` is not under the `out` directory. The terminating slash may be removed in various places. On Linux `println(new File("/var/"))` returns `/var`, but `println(new File("/var", "/"))` - `/var/`, however `println(new File("/var", "/").getCanonicalPath())` - `/var`. \- [@JarLob (Jaroslav Lobačevski)](https://github.com/JarLob) ### Patches Upgrade to the AWS SDK for Java >= 1.12.261, if you are on a version < 1.12.261. ### Workarounds When calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` . ### References Similar vulnerabilities: - ESAPI (The OWASP Enterprise Security API) - https://nvd.nist.gov/vuln/detail/CVE-2022-23457 ### For more information If you have any questions or comments about this advisory, please contact [AWS's Security team](mailto:[email protected]).
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.amazonaws:aws-java-sdk-s3" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.12.261" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31159" }, { "type": "WEB", "url": "https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc48ddced8a9a" }, { "type": "PACKAGE", "url": "https://github.com/aws/aws-sdk-java" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-07-15T20:44:55", "nvd_published_at": "2022-07-15T18:15:00" }
1.4.0
GHSA-hcwx-7q5v-vc67
2022-11-01T22:37:41
2022-05-14T03:12:09
[ "CVE-2018-12036" ]
Path Traversal in OWASP Dependency-Check
OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.owasp:dependency-check-maven" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "3.2.0" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12036" }, { "type": "PACKAGE", "url": "https://github.com/jeremylong/DependencyCheck" }, { "type": "WEB", "url": "https://github.com/jeremylong/DependencyCheck/blob/master/RELEASE_NOTES.md#version-320-2018-05-21" }, { "type": "WEB", "url": "https://github.com/snyk/zip-slip-vulnerability" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-11-01T22:37:41", "nvd_published_at": "2018-06-07T18:29:00" }
1.4.0
GHSA-gwxv-jv83-6qjr
2023-06-06T00:45:18
2023-06-06T00:45:18
[ "CVE-2023-33962" ]
JStachio XSS vulnerability: Unescaped single quotes
### Impact #### Description: JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. #### Reproduction Steps: Use the following template code: ```html <div attr='{{value}}'></div> ``` Set the value variable to `' onblur='alert(1)`. ```java public class Escaping { public static void main(String[] args) { Model model = new Model("' onblur='alert(1)"); String result = AttributeTemplate.of().execute(model); System.out.println(result); } @JStache(template = "<div attr='{{value}}'></div>", name="AttributeTemplate") @JStacheConfig(contentType= Html.class) public static class Model { public final String value; public Model(String value) { this.value = value; } public String getValue() { return value; } } } ``` Expected Result: The resulting output should have properly escaped the single quotes and not execute the injected JavaScript code. Actual Result: The resulting output is vulnerable and renders as follows: ```html <div attr='' onblur='alert(1)'></div> ``` #### Impact and Risk: This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware. #### Proposed Solution: To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `&#39`. ### Patches - ### Workarounds As long as users stick with double quotes `"` for HTML attributes, they should not be affected. ### References For instance, [Rocker's general purpose HTML escaping](https://github.com/fizzed/rocker/blob/d749fbf68179b31a64d541f5e18e0e25bc5c2d1b/rocker-runtime/src/main/java/com/fizzed/rocker/runtime/DefaultHtmlStringify.java#L64)
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "io.jstach:jstachio" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.0.1" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33962" }, { "type": "WEB", "url": "https://github.com/jstachio/jstachio/issues/157" }, { "type": "WEB", "url": "https://github.com/jstachio/jstachio/pull/158" }, { "type": "WEB", "url": "https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66" }, { "type": "PACKAGE", "url": "https://github.com/jstachio/jstachio" }, { "type": "WEB", "url": "https://github.com/jstachio/jstachio/releases/tag/v1.0.1" } ]
{ "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-06-06T00:45:18", "nvd_published_at": "2023-05-30T22:15:10" }
1.4.0
GHSA-32xf-jwmv-9hf3
2022-09-21T19:31:46
2020-06-05T16:13:20
[ "CVE-2020-5410" ]
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-config-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.1.0", "fixed": null }, { "introduced": null, "fixed": "2.1.9" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.springframework.cloud:spring-cloud-config-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.2.0", "fixed": null }, { "introduced": null, "fixed": "2.2.3" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410" }, { "type": "PACKAGE", "url": "https://github.com/spring-cloud/spring-cloud-config" }, { "type": "WEB", "url": "https://tanzu.vmware.com/security/cve-2020-5410" } ]
{ "cwe_ids": [ "CWE-22", "CWE-23" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-04T19:07:50", "nvd_published_at": "2020-06-02T17:15:00" }
1.4.0
GHSA-mw36-7c6c-q4q2
2022-02-08T22:03:00
2020-11-16T20:07:59
[ "CVE-2020-26217" ]
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14. ### Workarounds No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use. Users of XStream 1.4.13 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type)); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### Credits Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html). ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.4.14-jdk7" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26217" }, { "type": "WEB", "url": "https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a" }, { "type": "WEB", "url": "https://x-stream.github.io/CVE-2020-26217.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2020/dsa-4811" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210409-0004" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E" }, { "type": "PACKAGE", "url": "https://github.com/x-stream/xstream" } ]
{ "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-11-16T20:06:06", "nvd_published_at": "2020-11-16T21:15:00" }
1.4.0
GHSA-pv7v-ph6g-3gxv
2023-05-09T19:59:31
2023-05-09T19:59:31
[ "CVE-2023-31126" ]
Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml
### Impact The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki: ``` [[Link1>>https://XWiki.example.com||data-x/onmouseover="alert('XSS1')"]]. ``` When a user moves the mouse over this link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. Note that this vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like `/` and `>` are removed in all attribute names. ### Patches This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by making sure that data attributes only contain allowed characters. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://jira.xwiki.org/browse/XCOMMONS-2606 * https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:[email protected])
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "org.xwiki.commons:xwiki-commons-xml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "14.6-rc-1", "fixed": null }, { "introduced": null, "fixed": "14.10.4" } ] } ] } ]
[ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31126" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-commons" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XCOMMONS-2606" } ]
{ "cwe_ids": [ "CWE-79", "CWE-86" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-05-09T19:59:31", "nvd_published_at": "2023-05-09T13:15:18" }
1.4.0
GHSA-f554-x222-wgf7
2024-03-04T23:51:42
2019-05-29T18:05:03
[ "CVE-2013-7285" ]
Command Injection in Xstream
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
[ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ]
[ { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "1.4.7" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "com.thoughtworks.xstream:xstream" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.4.10", "fixed": null }, { "introduced": null, "fixed": "1.4.11" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285" }, { "type": "WEB", "url": "https://github.com/x-stream/xstream/commit/6344867dce6767af7d0fe34fb393271a6456672d" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E" }, { "type": "WEB", "url": "https://www.mail-archive.com/[email protected]/msg00604.html" }, { "type": "WEB", "url": "https://www.mail-archive.com/[email protected]/msg00607.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "type": "WEB", "url": "https://x-stream.github.io/CVE-2013-7285.html" }, { "type": "WEB", "url": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q1/69" }, { "type": "WEB", "url": "http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html" } ]
{ "cwe_ids": [ "CWE-77", "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2019-05-15T23:13:58", "nvd_published_at": "2019-05-15T17:29:00" }
1.4.0
GHSA-p9j6-4pjr-gp48
2022-08-11T16:59:22
2020-12-18T18:28:23
[ "CVE-2020-35460" ]
MPXJ path Traversal vulnerability
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
[ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ]
[ { "package": { "ecosystem": "Maven", "name": "net.sf.mpxj:mpxj" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0", "fixed": null }, { "introduced": null, "fixed": "8.3.5" } ] } ] } ]
[ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35460" }, { "type": "WEB", "url": "https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "type": "WEB", "url": "http://www.mpxj.org/changes-report.html#a8.3.5" } ]
{ "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-12-17T23:15:51", "nvd_published_at": "2020-12-14T23:15:00" }