Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[electron] Exfiltration of hashed SMB credentials on Windows via file:// redirect

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/10/2022

Impact
When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as file://some….

[pymatgen] pymatgen is vulnerable to Regular Expression Denial of Service (ReDoS)

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/11/2022

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the GaussianInput.from_string method.
References

https://nvd.nist.gov/vuln/detail/CVE-2022…

[snowflake-connector-python] snowflake-connector-python is vulnerable to Regular Expression Denial of Service (ReDoS)

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/11/2022

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the get_file_transfer_type method.
References

https://nvd.nist.gov/vuln/…

[cleo] cleo is vulnerable to Regular Expression Denial of Service (ReDoS)

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/29/2022

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-42966
https://…

[Lin-CMS] Lin CMS vulnerable to Improper Authentication

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/22/2022

An authentication bypass in Lin-CMS v0.2.1 allows attackers to escalate privileges to Super Administrator.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-44244
https://gist.github.com/cai-niao98/58c97899695488bd73a73d56adf44c4c
https://github.co…

[github.com/hashicorp/nomad] HashiCorp Nomad vulnerable to non-sensitive metadata exposure

  • Posted inMODERATE
  • Posted byGitHub
  • 11/10/202211/11/2022

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2.
References

https://nvd.nist.gov/vuln/detail/CVE-2022…

[github.com/hashicorp/nomad] HashiCorp Nomad vulnerable to Insufficient Session Expiration

  • Posted inLOW
  • Posted byGitHub
  • 11/10/202211/11/2022

HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-3867
https://discuss.hashicor…

[github.com/istio/istio] Istio may allow identity impersonation if user has localhost access

  • Posted inHIGH
  • Posted byGitHub
  • 11/10/202211/17/2022

Impact
User can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane.
Patches
1.15.3
Workarounds
No. If using 1.15.2 please upgrade to 1.15.3 or later.
References
None at this time.
For mor…

[parse-server] Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers

  • Posted inHIGH
  • Posted byGitHub
  • 11/10/202211/12/2022

Impact
Keywords that are specified in the Parse Server option requestKeywordDenylist can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the requestKeywordDenylist option.
Patches
…

[github.com/go-vela/worker] Vela Insecure Defaults

  • Posted inCRITICAL
  • Posted byGitHub
  • 11/10/202211/18/2022

Impact
Some current default configurations for Vela allow exploitation and container breakouts.
Default Privileged Images
Running Vela plugins as privileged Docker containers allows a malicious user to easily break out of the container and gain access …

Posts navigation

Previous Posts 1 … 13 14 15 16 17 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close