Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[org.richfaces:richfaces-core] Arbitrary code execution in Richfaces

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData o…

[org.jvnet.hudson.plugins:hipchat] Jenkins HipChat Plugin allows attackers with Overall/Read access to obtain credential IDs

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/23/2022

An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins. As of version 2.2.1, an enume…

[org.jvnet.hudson.plugins:hipchat] Jenkins HipChat Plugin allows credential capture due to incorrect authorization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/23/2022

An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified…

[io.jenkins.blueocean:blueocean] Missing Authorization in Jenkins Blue Ocean Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient.
References

https://nvd.nist.gov/vuln/d…

[org.apache.geode:geode-core] Apache Geode vulnerable to Incorrect Authorization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be …

[org.richfaces:richfaces-core] Richfaces vulnerable to arbitrary code execution

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via or…

[org.jenkins-ci.main:jenkins-core] Incorrect Authorization in Jenkins Core

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/09/2022

Jenkins before versions before 2.44 are vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenki…

[org.apache.struts:struts2-core] Code injection in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/12/2022

A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks.
both the s:url and s:a tag provide an includeParams attribute.
The main scope of that …

[org.apache.struts:struts2-core] Code injection in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with “action:” or “redirect:”, followed by a desired navigational target expression. This mechanism was intended to help with attachin…

[org.apache.struts:struts2-core] Server side object manipulation in Apache Struts

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/04/2022

OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the ‘#’-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context obj…

Posts navigation

Previous Posts 1 … 99 100 101 102 103 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close