-
Notifications
You must be signed in to change notification settings - Fork 343
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
b310558
commit a0e0a0a
Showing
3 changed files
with
143 additions
and
40 deletions.
There are no files selected for viewing
66 changes: 66 additions & 0 deletions
66
advisories/github-reviewed/2024/12/GHSA-j5vv-6wjg-cfr8/GHSA-j5vv-6wjg-cfr8.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-j5vv-6wjg-cfr8", | ||
"modified": "2024-12-27T18:02:02Z", | ||
"published": "2024-12-27T18:02:02Z", | ||
"aliases": [ | ||
"CVE-2024-56509" | ||
], | ||
"summary": "changedetection.io Vulnerable to Improper Input Validation Leading to LFR/Path Traversal", | ||
"details": "### Summary\nImproper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using `file:../../../etc/passwd` or `file: ///etc/passwd` can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient.\n\n### Details\nThe check in this line of code is insufficient.\n```\nif re.search(r'^file:/', url.strip(), re.IGNORECASE):\n```\nThe attacker can still bypass this by using:\n-`file:../../../../etc/passwd`\n-`file: ///etc/passwd` (with space before /)\n\n### PoC\n- Open up a changedetection.io instance with a webdriver configured.\n- Create a new watch with `file:../../../../etc/passwd`.\n- Check the watch preview.\n- The contents of `/etc/passwd` should pop out.\n\n### Screenshots\n![image](https://github.com/user-attachments/assets/55c34f2e-cafb-4a7a-a7ef-ec222e3f519b)\n![image](https://github.com/user-attachments/assets/d41189f5-7bf2-48b5-9ce3-c26f79cefeda)", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"package": { | ||
"ecosystem": "PyPI", | ||
"name": "changedetection.io" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "ECOSYSTEM", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "0.48.05" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-j5vv-6wjg-cfr8" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/dgtlmoon/changedetection.io/commit/4419bc0e61d0b03c588bd573a3602bbcfd953671" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/dgtlmoon/changedetection.io/commit/f7e9846c9b40a229813d19cdb66bf60fbe5e6a2a" | ||
}, | ||
{ | ||
"type": "PACKAGE", | ||
"url": "https://github.com/dgtlmoon/changedetection.io" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-200", | ||
"CWE-22" | ||
], | ||
"severity": "HIGH", | ||
"github_reviewed": true, | ||
"github_reviewed_at": "2024-12-27T18:02:02Z", | ||
"nvd_published_at": null | ||
} | ||
} |
77 changes: 77 additions & 0 deletions
77
advisories/github-reviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-pq9p-pc3p-9hm4", | ||
"modified": "2024-12-27T18:02:42Z", | ||
"published": "2024-12-27T03:31:23Z", | ||
"aliases": [ | ||
"CVE-2024-9774" | ||
], | ||
"summary": "python-sql SQL injection vulnerability", | ||
"details": "A vulnerability was found in python-sql where unary operators do not escape non-Expression (like `And` and `Or`) which makes any system exposing those vulnerable to an SQL injection attack.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"package": { | ||
"ecosystem": "PyPI", | ||
"name": "python-sql" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "ECOSYSTEM", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "1.5.2" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9774" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://bugs.tryton.org/python-sql/93" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889/3" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://foss.heptapod.net/tryton/python-sql/-/commit/f20551bbb8b3b4c4dd0a2c3d36f377bff6f2f349" | ||
}, | ||
{ | ||
"type": "PACKAGE", | ||
"url": "https://github.com/tryton/python-sql" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00023.html" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-150" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": true, | ||
"github_reviewed_at": "2024-12-27T18:02:41Z", | ||
"nvd_published_at": "2024-12-27T02:15:07Z" | ||
} | ||
} |
40 changes: 0 additions & 40 deletions
40
advisories/unreviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json
This file was deleted.
Oops, something went wrong.