Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 14 changed files with 569 additions and 149 deletions.
Original file line number Diff line number Diff line change
@@ -1,19 +1,40 @@
{
"schema_version": "1.4.0",
"id": "GHSA-22c5-cpvr-cfvq",
"modified": "2024-12-12T09:31:36Z",
"modified": "2024-12-12T19:20:14Z",
"published": "2024-12-12T09:31:36Z",
"aliases": [
"CVE-2024-4109"
],
"summary": "undertow: information leakage via HTTP/2 request header reuse",
"details": "A flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"affected": [],
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "io.undertow:undertow-core"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.3.18.Final"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
Expand All @@ -26,15 +47,23 @@
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272325"
},
{
"type": "PACKAGE",
"url": "https://github.com/undertow-io/undertow"
},
{
"type": "WEB",
"url": "https://github.com/undertow-io/undertow/blob/6ae61c6af88d2a8341922ccd0de98926e8349543/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java#L250-L259"
}
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"severity": "HIGH",
"github_reviewed": false,
"github_reviewed_at": null,
"github_reviewed": true,
"github_reviewed_at": "2024-12-12T19:20:14Z",
"nvd_published_at": "2024-12-12T09:15:06Z"
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-25w9-wqfq-gwqx",
"modified": "2024-12-12T17:42:34Z",
"modified": "2024-12-12T19:19:39Z",
"published": "2024-12-11T18:44:50Z",
"aliases": [
"CVE-2024-55658"
Expand Down Expand Up @@ -51,6 +51,10 @@
{
"type": "PACKAGE",
"url": "https://github.com/siyuan-note/siyuan"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2024-3323"
}
],
"database_specific": {
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
{
"schema_version": "1.4.0",
"id": "GHSA-2r87-74cx-2p7c",
"modified": "2024-12-12T19:21:06Z",
"published": "2024-12-12T19:21:06Z",
"aliases": [
"CVE-2024-55877"
],
"summary": "XWiki allows remote code execution from account through macro descriptions and XWiki.XWikiSyntaxMacrosList",
"details": "### Impact\nAny user with an account can perform arbitrary remote code execution by adding instances of `XWiki.WikiMacroClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation.\n\nTo reproduce on a instance, as a connected user without script nor programming rights, go to your user profile and add an object of type `XWiki.WikiMacroClass`. Set \"Macro Id\", \"Macro Name\" and \"Macro Code\" to any value, \"Macro Visibility\" to `Current User` and \"Macro Description\" to `{{async}}{{groovy}}println(\"Hello from User macro!\"){{/groovy}}{{/async}}`.\nSave the page, then go to `<host>/xwiki/bin/view/XWiki/XWikiSyntaxMacrosList`.\nIf the description of your new macro reads \"Hello from User macro!\", then your instance is vulnerable.\n\n### Patches\nThis vulnerability has been fixed in XWiki 15.10.11, 16.4.1 and 16.5.0.\n\n### Workarounds\nIt is possible to manually apply [this patch](https://github.com/xwiki/xwiki-platform/commit/40e1afe001d61eafdf13f3621b4b597a0e58a3e3#diff-92fee29683e671b8bc668e3cf4295713d6259f715e3954876049f9de77c0a9ef) to the page `XWiki.XWikiSyntaxMacrosList`.\n\n### References\n\n* https://jira.xwiki.org/browse/XWIKI-22030\n* https://github.com/xwiki/xwiki-platform/commit/40e1afe001d61eafdf13f3621b4b597a0e58a3e3",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-help-ui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "9.7-rc-1"
},
{
"fixed": "15.10.11"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-help-ui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "16.0.0-rc-1"
},
{
"fixed": "16.4.1"
}
]
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-help-ui"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "16.5.0-rc-1"
},
{
"fixed": "16.5.0"
}
]
}
]
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2r87-74cx-2p7c"
},
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-platform/commit/40e1afe001d61eafdf13f3621b4b597a0e58a3e3"
},
{
"type": "PACKAGE",
"url": "https://github.com/xwiki/xwiki-platform"
},
{
"type": "WEB",
"url": "https://jira.xwiki.org/browse/XWIKI-22030"
}
],
"database_specific": {
"cwe_ids": [
"CWE-96"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2024-12-12T19:21:06Z",
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4pjc-pwgq-q9jp",
"modified": "2024-12-12T17:42:57Z",
"modified": "2024-12-12T19:20:33Z",
"published": "2024-12-11T18:44:47Z",
"aliases": [
"CVE-2024-55660"
Expand Down Expand Up @@ -51,6 +51,10 @@
{
"type": "PACKAGE",
"url": "https://github.com/siyuan-note/siyuan"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2024-3324"
}
],
"database_specific": {
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
{
"schema_version": "1.4.0",
"id": "GHSA-75mx-hw5q-pvx3",
"modified": "2024-12-12T19:19:33Z",
"published": "2024-12-12T03:33:05Z",
"aliases": [
"CVE-2024-55587"
],
"summary": "python-libarchive directory traversal",
"details": "python-libarchive through 4.2.1 allows directory traversal (to create files) in extract in zip.py for ZipFile.extractall and ZipFile.extract.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
}
],
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "python-libarchive"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.1"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55587"
},
{
"type": "WEB",
"url": "https://github.com/smartfile/python-libarchive/issues/42"
},
{
"type": "WEB",
"url": "https://github.com/smartfile/python-libarchive/pull/41"
},
{
"type": "PACKAGE",
"url": "https://github.com/smartfile/python-libarchive"
},
{
"type": "WEB",
"url": "https://github.com/smartfile/python-libarchive/blob/c7677411bfc4ab5701d343bc6ebd9e35c990e80e/libarchive/zip.py#L107"
}
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-12-12T19:19:33Z",
"nvd_published_at": "2024-12-12T02:08:22Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"schema_version": "1.4.0",
"id": "GHSA-7prj-hgx4-2xc3",
"modified": "2024-12-12T19:20:26Z",
"published": "2024-12-12T19:20:26Z",
"aliases": [],
"summary": "Potential Vulnerabilities Due to Outdated golang.org/x/crypto Dependency in NanoProxy",
"details": "A security issue was identified in the NanoProxy project related to the `golang.org/x/crypto` dependency. The project was using an outdated version of this dependency, which potentially exposed the system to security vulnerabilities that have been addressed in subsequent updates.\n\nImpact:\nThe specific vulnerabilities in the outdated version of `golang.org/x/crypto` could include authorization bypasses, data breaches, or other security risks. These vulnerabilities can be exploited by attackers to compromise the integrity, confidentiality, or availability of the system.\n\nResolution:\nThe issue has been fixed in NanoProxy by upgrading the `golang.org/x/crypto` dependency to version 0.31.0. Users are strongly encouraged to update their instances of NanoProxy to include this fix and ensure they are using the latest secure version of all dependencies.\n\nFixed Version:\n* `golang.org/x/crypto` upgraded to version 0.31.0.",
"severity": [],
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/ryanbekhen/nanoproxy"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.15.0"
}
]
}
]
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/ryanbekhen/nanoproxy/security/advisories/GHSA-7prj-hgx4-2xc3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45337"
},
{
"type": "PACKAGE",
"url": "https://github.com/ryanbekhen/nanoproxy"
}
],
"database_specific": {
"cwe_ids": [
"CWE-1395",
"CWE-285"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-12-12T19:20:26Z",
"nvd_published_at": null
}
}
Loading

0 comments on commit 1406fd4

Please sign in to comment.