From a0e0a0a861366d9d7cb4373edd371e8212b67ab2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 27 Dec 2024 18:03:34 +0000 Subject: [PATCH] Publish Advisories GHSA-j5vv-6wjg-cfr8 GHSA-pq9p-pc3p-9hm4 GHSA-pq9p-pc3p-9hm4 --- .../GHSA-j5vv-6wjg-cfr8.json | 66 ++++++++++++++++ .../GHSA-pq9p-pc3p-9hm4.json | 77 +++++++++++++++++++ .../GHSA-pq9p-pc3p-9hm4.json | 40 ---------- 3 files changed, 143 insertions(+), 40 deletions(-) create mode 100644 advisories/github-reviewed/2024/12/GHSA-j5vv-6wjg-cfr8/GHSA-j5vv-6wjg-cfr8.json create mode 100644 advisories/github-reviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json delete mode 100644 advisories/unreviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json diff --git a/advisories/github-reviewed/2024/12/GHSA-j5vv-6wjg-cfr8/GHSA-j5vv-6wjg-cfr8.json b/advisories/github-reviewed/2024/12/GHSA-j5vv-6wjg-cfr8/GHSA-j5vv-6wjg-cfr8.json new file mode 100644 index 0000000000000..1595d6ae41af1 --- /dev/null +++ b/advisories/github-reviewed/2024/12/GHSA-j5vv-6wjg-cfr8/GHSA-j5vv-6wjg-cfr8.json @@ -0,0 +1,66 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j5vv-6wjg-cfr8", + "modified": "2024-12-27T18:02:02Z", + "published": "2024-12-27T18:02:02Z", + "aliases": [ + "CVE-2024-56509" + ], + "summary": "changedetection.io Vulnerable to Improper Input Validation Leading to LFR/Path Traversal", + "details": "### Summary\nImproper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using `file:../../../etc/passwd` or `file: ///etc/passwd` can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient.\n\n### Details\nThe check in this line of code is insufficient.\n```\nif re.search(r'^file:/', url.strip(), re.IGNORECASE):\n```\nThe attacker can still bypass this by using:\n-`file:../../../../etc/passwd`\n-`file: ///etc/passwd` (with space before /)\n\n### PoC\n- Open up a changedetection.io instance with a webdriver configured.\n- Create a new watch with `file:../../../../etc/passwd`.\n- Check the watch preview.\n- The contents of `/etc/passwd` should pop out.\n\n### Screenshots\n![image](https://github.com/user-attachments/assets/55c34f2e-cafb-4a7a-a7ef-ec222e3f519b)\n![image](https://github.com/user-attachments/assets/d41189f5-7bf2-48b5-9ce3-c26f79cefeda)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "changedetection.io" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.48.05" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-j5vv-6wjg-cfr8" + }, + { + "type": "WEB", + "url": "https://github.com/dgtlmoon/changedetection.io/commit/4419bc0e61d0b03c588bd573a3602bbcfd953671" + }, + { + "type": "WEB", + "url": "https://github.com/dgtlmoon/changedetection.io/commit/f7e9846c9b40a229813d19cdb66bf60fbe5e6a2a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/dgtlmoon/changedetection.io" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200", + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2024-12-27T18:02:02Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json b/advisories/github-reviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json new file mode 100644 index 0000000000000..907a1040e0a06 --- /dev/null +++ b/advisories/github-reviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json @@ -0,0 +1,77 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pq9p-pc3p-9hm4", + "modified": "2024-12-27T18:02:42Z", + "published": "2024-12-27T03:31:23Z", + "aliases": [ + "CVE-2024-9774" + ], + "summary": "python-sql SQL injection vulnerability", + "details": "A vulnerability was found in python-sql where unary operators do not escape non-Expression (like `And` and `Or`) which makes any system exposing those vulnerable to an SQL injection attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "python-sql" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.5.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9774" + }, + { + "type": "WEB", + "url": "https://bugs.tryton.org/python-sql/93" + }, + { + "type": "WEB", + "url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889" + }, + { + "type": "WEB", + "url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889/3" + }, + { + "type": "WEB", + "url": "https://foss.heptapod.net/tryton/python-sql/-/commit/f20551bbb8b3b4c4dd0a2c3d36f377bff6f2f349" + }, + { + "type": "PACKAGE", + "url": "https://github.com/tryton/python-sql" + }, + { + "type": "WEB", + "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00023.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-150" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2024-12-27T18:02:41Z", + "nvd_published_at": "2024-12-27T02:15:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json b/advisories/unreviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json deleted file mode 100644 index 86502eb668ee8..0000000000000 --- a/advisories/unreviewed/2024/12/GHSA-pq9p-pc3p-9hm4/GHSA-pq9p-pc3p-9hm4.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-pq9p-pc3p-9hm4", - "modified": "2024-12-27T03:31:23Z", - "published": "2024-12-27T03:31:23Z", - "aliases": [ - "CVE-2024-9774" - ], - "details": "A vulnerability was found in python-sql where unary operators do not escape non-Expression.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9774" - }, - { - "type": "WEB", - "url": "https://discuss.tryton.org/t/security-release-for-issue-93/7889/3" - }, - { - "type": "WEB", - "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00023.html" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-150" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2024-12-27T02:15:07Z" - } -} \ No newline at end of file