Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[isolated-vm] isolated-vm has vulnerable CachedDataOptions in API

  • Posted inCRITICAL
  • Posted byGitHub
  • 10/01/202210/07/2022

Impact
If the untrusted v8 cached data is passed to the API through CachedDataOptions, the attackers can bypass the sandbox and run arbitrary code in the nodejs process. There are currently no known fixed versions or workarounds.
References

https://gi…

[matrix-nio] When matrix-nio receives forwarded room keys, the receiver doesn’t check if it requested the key from the forwarder

  • Posted inHIGH
  • Posted byGitHub
  • 10/01/202210/01/2022

When matrix-nio before 0.20 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn’t check that the device that responded matches the device the key was requested fro…

[matrix-sdk-crypto] matrix-sdk-crypto contains potential impersonation via room key forward responses

  • Posted inMODERATE
  • Posted byGitHub
  • 10/01/202210/05/2022

Impact
When matrix-rust-sdk before 0.6 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn’t check that the device that responded matches the device the key was re…

[matrix-js-sdk] matrix-js-sdk subject to user impersonation due to key/device identifier confusion in SAS verification

  • Posted inHIGH
  • Posted byGitHub
  • 10/01/202210/01/2022

Impact
An attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users’ identities, leading to the other device trusting/verify…

[@next-auth/upstash-redis-adapter] Upstash Adapter missing token verification

  • Posted inMODERATE
  • Posted byGitHub
  • 09/30/202209/30/2022

Impact
Applications that use next-auth Email Provider and @next-auth/upstash-redis-adapter before v3.0.2 are affected.
Description
The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking f…

[twig/twig] Twig may load a template outside a configured directory when using the filesystem loader

  • Posted inHIGH
  • Posted byGitHub
  • 09/30/202210/13/2022

Description
When using the filesystem loader to load templates for which the name is a user input, it is possible to use the source or include statement to read arbitrary files from outside the templates directory when using a namespace like @somewhere…

[CompositeC1.Core] Orckestra C1 CMS’s deserialization of untrusted data allows for arbitrary code execution.

  • Posted inCRITICAL
  • Posted byGitHub
  • 09/30/202209/30/2022

Impact
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS.
Authentication is required to exploit this vulnerability.
The authenticated user may perform the actions unknowingly by visiting…

[com.wire.bots:lithium] Lithium vulnerable to Cross Site Scripting in provided Swagger-UI

  • Posted inHIGH
  • Posted byGitHub
  • 09/30/202210/06/2022

Impact
A XSS vulnerability in the provided (outdated) Swagger-UI is exploitable in applications using lithium with Swagger-UI enabled.
This allows an attacker gain Remote Code Execution (RCE) and potentially exfiltrate secrets in the context of this s…

[org.matrix.android:matrix-android-sdk2] matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion

  • Posted inHIGH
  • Posted byGitHub
  • 09/30/202209/30/2022

Impact
An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield.
Additionally, a sophisticated attacker cooperating with a malici…

[org.matrix.android:matrix-android-sdk2] matrix-android-sdk2 vulnerable to impersonation via forwarded Megolm sessions

  • Posted inHIGH
  • Posted byGitHub
  • 09/30/2022

Impact
An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others.
This attack is possible …

Posts navigation

Previous Posts 1 … 39 40 41 42 43 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close