Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[rdiffweb] rdiffweb CSRF could lead to disabling notifications in user profile

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/23/2022

rdiffweb prior to 2.4.6 is vulnerable to Cross-Site Request Forgery (CSRF), which could lead to disabling notifications in a user’s profile.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-3233
https://github.com/ikus060/rdiffweb/commit/18a5aabd4…

[autogluon.multimodal] autogluon.multimodal vulnerable to unsafe YAML deserialization

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/2022

Impact
A potential unsafe deserialization issue exists within the autogluon.multimodal module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of untrusted data may allow an unprivileged third party to cause…

[@netlify/ipx] @netlify/ipx vulnerable to Full Response SSRF and Stored XSS via Cache Poisoning and Improper Host Validation

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/28/2022

Impact
By sending specially crafted headers an attacker can bypass the source image domain allowlist, causing the handler to load and return arbitrary images. Because the response is cached globally, this image will then be served to visitors without r…

[python-jwt] python-jwt vulnerable to token forgery with new claims

  • Posted inCRITICAL
  • Posted byGitHub
  • 09/22/202209/27/2022

Impact
An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user’s identities, hijack their sessions, or bypass authentica…

[parse-server] parse-server auth adapter app ID validation can be circumvented

  • Posted inLOW
  • Posted byGitHub
  • 09/22/202209/27/2022

Impact
Validation of the authentication adapter app ID for Facebook and Spotify may be circumvented.
This fixes a vulnerability that affects configurations which allow users to authenticate using the Parse Server authentication adapter for Facebook or …

[fhir-works-on-aws-authz-smart] fhir-works-on-aws-authz-smart handles permissions improperly

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/27/2022

Impact
This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the clien…

[parse-server] parse-server’s session object properties can be updated by foreign user if object ID is known

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/27/2022

Impact
A foreign user can write to the session object of another user if the session object ID is known. For example, a foreign user can assign the session object to their own user by writing to the user field and then read any custom fields of that se…

[commonmarker] Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/22/2022

Impact
CommonMarker uses cmark-gfm for rendering Github Flavored Markdown. A polynomial time complexity issue in cmark-gfm’s autolink extension may lead to unbounded resource exhaustion and subsequent denial of service.
Patches
This vulnerability has b…

[arr-pm] arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm.

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/202209/24/2022

Impact
Arbitrary shell execution is possible when using RPM::File#files and RPM::File#extract if the RPM contains a malicious “payload compressor” field.
This vulnerability impacts the extract and files methods of the RPM::File class in the affected ve…

[jwcrypto] jwcrypto token substitution can lead to authentication bypass

  • Posted inMODERATE
  • Posted byGitHub
  • 09/22/202209/22/2022

The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token.
Quoting the private disclosure we received : “Under certain circumstances, it is possible …

Posts navigation

Previous Posts 1 … 49 50 51 52 53 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close