schema_version
string | id
string | modified
timestamp[s] | published
timestamp[s] | aliases
sequence | summary
string | details
string | severity
list | affected
list | references
list | database_specific
dict |
---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-m4fv-gm5m-4725 | 2023-04-10T16:25:41 | 2023-03-01T17:58:01 | [
"CVE-2022-1274"
] | HTML Injection in Keycloak Admin REST API | The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-services"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "20.0.5"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1274"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/pull/16764"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073157"
},
{
"type": "PACKAGE",
"url": "https://github.com/keycloak/keycloak"
},
{
"type": "WEB",
"url": "https://herolab.usd.de/security-advisories/usd-2021-0033"
}
] | {
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-03-01T17:58:01",
"nvd_published_at": "2023-03-29T21:15:00"
} |
1.4.0 | GHSA-8vhq-qq4p-grq3 | 2022-07-01T21:47:32 | 2022-05-13T01:11:53 | [
"CVE-2017-1000487"
] | OS Command Injection in Plexus-utils | Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-utils"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "3.0.16"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000487"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1322"
},
{
"type": "PACKAGE",
"url": "https://github.com/codehaus-plexus/plexus-utils"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r2e94f72f53df432302d359fd66cfa9e9efb8d42633d54579a4377e62@%3Cdev.avro.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00010.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00011.html"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31522"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4146"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4149"
}
] | {
"cwe_ids": [
"CWE-78"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2022-07-01T21:47:32",
"nvd_published_at": "2018-01-03T20:29:00"
} |
1.4.0 | GHSA-w3x5-427h-wfq6 | 2022-12-09T20:19:32 | 2022-12-09T20:19:32 | [
"CVE-2022-46166"
] | Spring Boot Admins integrated notifier support allows arbitrary code execution | ### Impact
All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected.
### Patches
In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection).
### Workarounds
* Disable any notifier
* Disable write access (POST request) on `/env` actuator endpoint
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "de.codecentric:spring-boot-admin"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.6.10"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "de.codecentric:spring-boot-admin"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.7.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.7.8"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "de.codecentric:spring-boot-admin"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.0.0-M1",
"fixed": null
},
{
"introduced": null,
"fixed": "3.0.0-M6"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6"
},
{
"type": "PACKAGE",
"url": "https://github.com/codecentric/spring-boot-admin"
}
] | {
"cwe_ids": [
"CWE-94"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-12-09T20:19:32",
"nvd_published_at": "2022-12-09T21:15:00"
} |
1.4.0 | GHSA-4m9r-5gqp-7j82 | 2021-06-11T14:37:55 | 2018-10-19T16:52:06 | [
"CVE-2016-10726"
] | High severity vulnerability that affects org.dspace:dspace-xmlui | The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-xmlui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.0",
"fixed": null
},
{
"introduced": null,
"fixed": "4.5"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-xmlui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0",
"fixed": null
},
{
"introduced": null,
"fixed": "5.5"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.dspace:dspace-xmlui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "3.6"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10726"
},
{
"type": "WEB",
"url": "https://github.com/DSpace/DSpace/releases/tag/dspace-5.5"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-4m9r-5gqp-7j82"
},
{
"type": "WEB",
"url": "https://jira.duraspace.org/browse/DS-3094"
},
{
"type": "WEB",
"url": "https://wiki.duraspace.org/display/DSDOC5x/Release+Notes"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T20:58:34",
"nvd_published_at": null
} |
1.4.0 | GHSA-mjmq-gwgm-5qhm | 2023-12-07T18:20:03 | 2023-07-10T18:30:49 | [
"CVE-2023-35887"
] | Apache MINA SSHD information disclosure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.
This issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3
Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sshd:sshd-common"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.1.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.9.3"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sshd:sshd-sftp"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.9.3"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sshd:sshd-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.1.0"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35887"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/pull/362"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0"
},
{
"type": "WEB",
"url": "https://github.com/apache/mina-sshd/commit/c20739b43aab0f7bf2ccad982a6cb37b9d5a8a0b"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/mina-sshd"
},
{
"type": "WEB",
"url": "https://issues.apache.org/jira/browse/SSHD-1324"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2"
}
] | {
"cwe_ids": [
"CWE-200",
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-07-10T21:53:01",
"nvd_published_at": "2023-07-10T16:15:53"
} |
1.4.0 | GHSA-cvx5-m8vg-vxgc | 2022-04-28T21:16:40 | 2022-04-28T21:16:40 | [
"CVE-2022-24897"
] | Arbitrary filesystem write access from velocity. | ### Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
### Patches
The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
### References
https://jira.xwiki.org/browse/XWIKI-5168
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:[email protected])
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-velocity"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.3.0",
"fixed": null
},
{
"introduced": null,
"fixed": "12.6.7"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-velocity"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "12.7.0",
"fixed": null
},
{
"introduced": null,
"fixed": "12.10.3"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24897"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/pull/127"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8"
},
{
"type": "PACKAGE",
"url": "https://github.com/xwiki/xwiki-commons"
},
{
"type": "WEB",
"url": "https://jira.xwiki.org/browse/XWIKI-5168"
}
] | {
"cwe_ids": [
"CWE-22",
"CWE-668"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-04-28T21:16:40",
"nvd_published_at": "2022-05-02T22:15:00"
} |
1.4.0 | GHSA-jc7h-c423-mpjc | 2024-01-22T21:32:36 | 2024-01-15T12:30:19 | [
"CVE-2023-46749"
] | Apache Shiro vulnerable to path traversal | Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting
Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.shiro:shiro-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.13.0"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.shiro:shiro-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.0.0alpha1",
"fixed": null
},
{
"introduced": null,
"fixed": "2.0.0-alpha4"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46749"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/mdv7ftz7k4488rzloxo2fb0p9shnp9wm"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2024-01-16T20:34:50",
"nvd_published_at": "2024-01-15T10:15:26"
} |
1.4.0 | GHSA-7wfc-x4f7-gg2x | 2022-03-18T17:58:01 | 2022-03-18T17:58:01 | [
"CVE-2021-30180"
] | Code injection in Apache Dubbo | Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.dubbo:dubbo"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.7.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.7.10"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E"
}
] | {
"cwe_ids": [
"CWE-444",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-06-02T20:19:48",
"nvd_published_at": "2021-06-01T14:15:00"
} |
1.4.0 | GHSA-395w-qhqr-9fr6 | 2021-01-06T20:01:15 | 2021-01-06T20:01:34 | [
"CVE-2020-17519"
] | Path Traversal in Apache Flink | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. | [] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.flink:flink-runtime_2.11"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.11.0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.11.3"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.flink:flink-runtime_2.12"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.11.0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.11.3"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17519"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/01/05/2"
}
] | {
"cwe_ids": [
"CWE-22",
"CWE-552"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-01-06T20:01:15",
"nvd_published_at": "2021-01-05T12:15:00"
} |
1.4.0 | GHSA-rhq2-2574-78mc | 2022-04-27T14:42:53 | 2018-10-17T19:54:53 | [
"CVE-2018-17297"
] | Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal | The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "cn.hutool:hutool-parent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "4.1.12"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "cn.hutool:hutool-all"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "4.1.12"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "cn.hutool:hutool-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "4.1.12"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17297"
},
{
"type": "WEB",
"url": "https://github.com/looly/hutool/issues/162"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-rhq2-2574-78mc"
},
{
"type": "PACKAGE",
"url": "https://github.com/looly/hutool"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:55:00",
"nvd_published_at": null
} |
1.4.0 | GHSA-h2rq-qhr7-53gm | 2024-02-14T14:52:14 | 2024-02-06T12:30:30 | [
"CVE-2024-23673"
] | Apache Sling Servlets Resolver executes malicious code via path traversal |
Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.
If the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.
Users are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.sling:org.apache.sling.servlets.resolver"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.11.0"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23673"
},
{
"type": "WEB",
"url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/sling-org-apache-sling-servlets-resolver"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/02/06/1"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-06T18:24:31",
"nvd_published_at": "2024-02-06T10:15:08"
} |
1.4.0 | GHSA-gpq8-963w-8qc9 | 2023-07-20T14:54:54 | 2023-07-12T12:31:36 | [
"CVE-2023-37582"
] | RocketMQ NameServer component Code Injection vulnerability | The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1.
When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as.
It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.rocketmq:rocketmq-namesrv"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "4.9.7"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.rocketmq:rocketmq-namesrv"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "5.0.0",
"fixed": null
},
{
"introduced": null,
"fixed": "5.1.2"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37582"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/rocketmq"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/07/12/1"
}
] | {
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-07-12T17:30:39",
"nvd_published_at": "2023-07-12T10:15:11"
} |
1.4.0 | GHSA-c28r-hw5m-5gv3 | 2022-08-05T00:22:25 | 2022-07-15T20:44:55 | [
"CVE-2022-31159"
] | Partial Path Traversal in com.amazonaws:aws-java-sdk-s3 | ### Overview
A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory.
This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`.
Versions of the AWS Java SDK for S3 v1 before and including v1.12.260 are affected by this issue.
### Impact
If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory.
#### Root Cause
The `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` contains a partial-path traversal vulnerability.
This is due to the guard logic in `leavesRoot` containing an insufficient protection against partial-path traversal.
https://github.com/aws/aws-sdk-java/blob/5be0807af763b9fbf6b0a153c76dd305e407f035/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1513-L1519
The application controls the `localBaseDirectory` argument, but the `key` comes from the AWS bucket entry (ie. can be attacker controlled). The above bit of logic can be bypassed with the following payloads:
```java
// The following will return 'false', although the attacker value will "leave" the `/usr/foo` directory
leavesRoot(new File("/usr/foo"), "/../foo-bar/bar")
```
This guard is used here which should guard against path traversal, however `leavesRoot` is an insufficient guard:
https://github.com/aws/aws-sdk-java/blob/ae88c8aa4b195047b94c154897475f85642d7eb3/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/transfer/TransferManager.java#L1420-L1423
#### True Root cause
If the result of `parent.getCanonicalPath()` is not slash terminated it allows for partial path traversal.
> Consider `"/usr/outnot".startsWith("/usr/out")`. The check is bypassed although `outnot` is not under the `out` directory.
The terminating slash may be removed in various places. On Linux `println(new File("/var/"))` returns `/var`, but `println(new File("/var", "/"))` - `/var/`, however `println(new File("/var", "/").getCanonicalPath())` - `/var`.
\- [@JarLob (Jaroslav Lobačevski)](https://github.com/JarLob)
### Patches
Upgrade to the AWS SDK for Java >= 1.12.261, if you are on a version < 1.12.261.
### Workarounds
When calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .
### References
Similar vulnerabilities:
- ESAPI (The OWASP Enterprise Security API) - https://nvd.nist.gov/vuln/detail/CVE-2022-23457
### For more information
If you have any questions or comments about this advisory, please contact [AWS's Security team](mailto:[email protected]).
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.amazonaws:aws-java-sdk-s3"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.12.261"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31159"
},
{
"type": "WEB",
"url": "https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc48ddced8a9a"
},
{
"type": "PACKAGE",
"url": "https://github.com/aws/aws-sdk-java"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-07-15T20:44:55",
"nvd_published_at": "2022-07-15T18:15:00"
} |
1.4.0 | GHSA-hcwx-7q5v-vc67 | 2022-11-01T22:37:41 | 2022-05-14T03:12:09 | [
"CVE-2018-12036"
] | Path Traversal in OWASP Dependency-Check | OWASP Dependency-Check before 3.2.0 allows attackers to write to arbitrary files via a crafted archive that holds directory traversal filenames. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.owasp:dependency-check-maven"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "3.2.0"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12036"
},
{
"type": "PACKAGE",
"url": "https://github.com/jeremylong/DependencyCheck"
},
{
"type": "WEB",
"url": "https://github.com/jeremylong/DependencyCheck/blob/master/RELEASE_NOTES.md#version-320-2018-05-21"
},
{
"type": "WEB",
"url": "https://github.com/snyk/zip-slip-vulnerability"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-11-01T22:37:41",
"nvd_published_at": "2018-06-07T18:29:00"
} |
1.4.0 | GHSA-gwxv-jv83-6qjr | 2023-06-06T00:45:18 | 2023-06-06T00:45:18 | [
"CVE-2023-33962"
] | JStachio XSS vulnerability: Unescaped single quotes | ### Impact
#### Description:
JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code.
#### Reproduction Steps:
Use the following template code:
```html
<div attr='{{value}}'></div>
```
Set the value variable to `' onblur='alert(1)`.
```java
public class Escaping {
public static void main(String[] args) {
Model model = new Model("' onblur='alert(1)");
String result = AttributeTemplate.of().execute(model);
System.out.println(result);
}
@JStache(template = "<div attr='{{value}}'></div>",
name="AttributeTemplate")
@JStacheConfig(contentType= Html.class)
public static class Model {
public final String value;
public Model(String value) {
this.value = value;
}
public String getValue() {
return value;
}
}
}
```
Expected Result:
The resulting output should have properly escaped the single quotes and not execute the injected JavaScript code.
Actual Result:
The resulting output is vulnerable and renders as follows:
```html
<div attr='' onblur='alert(1)'></div>
```
#### Impact and Risk:
This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware.
#### Proposed Solution:
To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`.
### Patches
-
### Workarounds
As long as users stick with double quotes `"` for HTML attributes, they should not be affected.
### References
For instance, [Rocker's general purpose HTML escaping](https://github.com/fizzed/rocker/blob/d749fbf68179b31a64d541f5e18e0e25bc5c2d1b/rocker-runtime/src/main/java/com/fizzed/rocker/runtime/DefaultHtmlStringify.java#L64)
| [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "io.jstach:jstachio"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.0.1"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33962"
},
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/issues/157"
},
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/pull/158"
},
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66"
},
{
"type": "PACKAGE",
"url": "https://github.com/jstachio/jstachio"
},
{
"type": "WEB",
"url": "https://github.com/jstachio/jstachio/releases/tag/v1.0.1"
}
] | {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-06-06T00:45:18",
"nvd_published_at": "2023-05-30T22:15:10"
} |
1.4.0 | GHSA-32xf-jwmv-9hf3 | 2022-09-21T19:31:46 | 2020-06-05T16:13:20 | [
"CVE-2020-5410"
] | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.cloud:spring-cloud-config-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.1.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.1.9"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.springframework.cloud:spring-cloud-config-server"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.2.0",
"fixed": null
},
{
"introduced": null,
"fixed": "2.2.3"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410"
},
{
"type": "PACKAGE",
"url": "https://github.com/spring-cloud/spring-cloud-config"
},
{
"type": "WEB",
"url": "https://tanzu.vmware.com/security/cve-2020-5410"
}
] | {
"cwe_ids": [
"CWE-22",
"CWE-23"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-06-04T19:07:50",
"nvd_published_at": "2020-06-02T17:15:00"
} |
1.4.0 | GHSA-mw36-7c6c-q4q2 | 2022-02-08T22:03:00 | 2020-11-16T20:07:59 | [
"CVE-2020-26217"
] | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.
### Workarounds
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.
Users of XStream 1.4.13 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### Credits
Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.4.14-jdk7"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26217"
},
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a"
},
{
"type": "WEB",
"url": "https://x-stream.github.io/CVE-2020-26217.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2020/dsa-4811"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210409-0004"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E"
},
{
"type": "PACKAGE",
"url": "https://github.com/x-stream/xstream"
}
] | {
"cwe_ids": [
"CWE-78"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2020-11-16T20:06:06",
"nvd_published_at": "2020-11-16T21:15:00"
} |
1.4.0 | GHSA-pv7v-ph6g-3gxv | 2023-05-09T19:59:31 | 2023-05-09T19:59:31 | [
"CVE-2023-31126"
] | Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml | ### Impact
The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki:
```
[[Link1>>https://XWiki.example.com||data-x/onmouseover="alert('XSS1')"]].
```
When a user moves the mouse over this link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance.
Note that this vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like `/` and `>` are removed in all attribute names.
### Patches
This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by making sure that data attributes only contain allowed characters.
### Workarounds
There are no known workarounds apart from upgrading to a version including the fix.
### References
* https://jira.xwiki.org/browse/XCOMMONS-2606
* https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org/)
* Email us at [XWiki Security mailing-list](mailto:[email protected]) | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.commons:xwiki-commons-xml"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "14.6-rc-1",
"fixed": null
},
{
"introduced": null,
"fixed": "14.10.4"
}
]
}
]
}
] | [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31126"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68"
},
{
"type": "PACKAGE",
"url": "https://github.com/xwiki/xwiki-commons"
},
{
"type": "WEB",
"url": "https://jira.xwiki.org/browse/XCOMMONS-2606"
}
] | {
"cwe_ids": [
"CWE-79",
"CWE-86"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2023-05-09T19:59:31",
"nvd_published_at": "2023-05-09T13:15:18"
} |
1.4.0 | GHSA-f554-x222-wgf7 | 2024-03-04T23:51:42 | 2019-05-29T18:05:03 | [
"CVE-2013-7285"
] | Command Injection in Xstream | Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "1.4.7"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.4.10",
"fixed": null
},
{
"introduced": null,
"fixed": "1.4.11"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7285"
},
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/commit/6344867dce6767af7d0fe34fb393271a6456672d"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E"
},
{
"type": "WEB",
"url": "https://www.mail-archive.com/[email protected]/msg00604.html"
},
{
"type": "WEB",
"url": "https://www.mail-archive.com/[email protected]/msg00607.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"type": "WEB",
"url": "https://x-stream.github.io/CVE-2013-7285.html"
},
{
"type": "WEB",
"url": "http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html"
},
{
"type": "WEB",
"url": "http://seclists.org/oss-sec/2014/q1/69"
},
{
"type": "WEB",
"url": "http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html"
}
] | {
"cwe_ids": [
"CWE-77",
"CWE-78"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2019-05-15T23:13:58",
"nvd_published_at": "2019-05-15T17:29:00"
} |
1.4.0 | GHSA-p9j6-4pjr-gp48 | 2022-08-11T16:59:22 | 2020-12-18T18:28:23 | [
"CVE-2020-35460"
] | MPXJ path Traversal vulnerability | common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations. | [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
}
] | [
{
"package": {
"ecosystem": "Maven",
"name": "net.sf.mpxj:mpxj"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0",
"fixed": null
},
{
"introduced": null,
"fixed": "8.3.5"
}
]
}
]
}
] | [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35460"
},
{
"type": "WEB",
"url": "https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"type": "WEB",
"url": "http://www.mpxj.org/changes-report.html#a8.3.5"
}
] | {
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2020-12-17T23:15:51",
"nvd_published_at": "2020-12-14T23:15:00"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.