Auto-Update: 2023-10-09T16:00:24.330729+00:00

This commit is contained in:
cad-safe-bot 2023-10-09 16:00:27 +00:00
parent b17958f4e6
commit 3972e7a8c3
9 changed files with 443 additions and 17 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-35950",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T14:15:10.437",
"lastModified": "2023-10-09T14:15:10.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OroCommerce is an open-source Business to Business Commerce application. In versions 4.1.0 through 4.1.13, 4.2.0 through 4.2.10, 5.0.0 prior to 5.0.11, and 5.1.0 prior to 5.1.1, the JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it. Versions 5.0.11 and 5.1.1 contain a fix for this issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-2jc6-3fhj-8q84",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-25822",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T14:15:10.547",
"lastModified": "2023-10-09T14:15:10.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ReportPortal is an AI-powered test automation platform. Prior to version 5.10.0 of the `com.epam.reportportal:service-api` module, corresponding to ReportPortal version 23.2, the ReportPortal database becomes unstable and reporting almost fully stops except for small launches with approximately 1 test inside when the test_item.path field is exceeded the allowable `ltree` field type indexing limit (path length>=120, approximately recursive nesting of the nested steps). REINDEX INDEX path_gist_idx and path_idx aren't helped. The problem was fixed in `com.epam.reportportal:service-api` module version 5.10.0 (product release 23.2), where the maximum number of nested elements were programmatically limited. A workaround is available. After deletion of the data with long paths, and reindexing both indexes (path_gist_idx and path_idx), the database becomes stable and ReportPortal works properly."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/reportportal/reportportal/releases/tag/v23.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/reportportal/reportportal/security/advisories/GHSA-mj24-gpw7-23m9",
"source": "security-advisories@github.com"
},
{
"url": "https://reportportal.io/docs/releases/Version23.2/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-36820",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T14:15:10.640",
"lastModified": "2023-10-09T14:15:10.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Micronaut Security is a security solution for applications. Prior to versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1, IdTokenClaimsValidator skips `aud` claim validation if token is issued by same identity issuer/provider. Any OIDC setup using Micronaut where multiple OIDC applications exists for the same issuer but token auth are not meant to be shared. This issue has been patched in versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/micronaut-projects/micronaut-security/commit/9728b925221a0d87798ccf250657a3c214b7e980",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-39928",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-06T16:15:13.223",
"lastModified": "2023-10-06T17:11:15.080",
"lastModified": "2023-10-09T15:15:09.890",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de use-after-free en la API MediaRecorder de Webkit WebKitGTK 2.40.5. Una p\u00e1gina web especialmente manipulada puede aprovechar esta vulnerabilidad para provocar da\u00f1os en la memoria y ejecuci\u00f3n de c\u00f3digo potencialmente arbitrario. Un usuario tendr\u00eda que visitar una p\u00e1gina web maliciosa para activar esta vulnerabilidad."
}
],
"metrics": {
@ -50,6 +54,10 @@
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831",
"source": "talos-cna@cisco.com"
},
{
"url": "https://webkitgtk.org/security/WSA-2023-0009.html",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-41660",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-09T14:15:10.723",
"lastModified": "2023-10-09T14:15:10.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPSynchro WP Synchro plugin <=\u00a01.9.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpsynchro/wordpress-wordpress-migration-plugin-db-files-wp-synchro-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-43643",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T14:15:10.797",
"lastModified": "2023-10-09T14:15:10.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/nahsra/antisamy/releases/tag/v1.7.4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-44378",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T14:15:10.873",
"lastModified": "2023-10-09T14:15:10.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
},
{
"lang": "en",
"value": "CWE-697"
}
]
}
],
"references": [
{
"url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zkopru-network/zkopru/issues/116",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-44393",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T15:15:10.057",
"lastModified": "2023-10-09T15:15:10.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/Piwigo/Piwigo/commit/cc99c0f1e967c5f1722a0cce30ff42374a7bbc23",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-09T14:00:24.478148+00:00
2023-10-09T16:00:24.330729+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-09T13:15:10.697000+00:00
2023-10-09T15:15:10.057000+00:00
```
### Last Data Feed Release
@ -29,30 +29,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227226
227233
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `7`
* [CVE-2023-43696](CVE-2023/CVE-2023-436xx/CVE-2023-43696.json) (`2023-10-09T12:15:10.067`)
* [CVE-2023-43699](CVE-2023/CVE-2023-436xx/CVE-2023-43699.json) (`2023-10-09T12:15:10.140`)
* [CVE-2023-43700](CVE-2023/CVE-2023-437xx/CVE-2023-43700.json) (`2023-10-09T12:15:10.207`)
* [CVE-2023-45247](CVE-2023/CVE-2023-452xx/CVE-2023-45247.json) (`2023-10-09T12:15:10.277`)
* [CVE-2023-45248](CVE-2023/CVE-2023-452xx/CVE-2023-45248.json) (`2023-10-09T12:15:10.347`)
* [CVE-2023-43697](CVE-2023/CVE-2023-436xx/CVE-2023-43697.json) (`2023-10-09T13:15:10.323`)
* [CVE-2023-43698](CVE-2023/CVE-2023-436xx/CVE-2023-43698.json) (`2023-10-09T13:15:10.407`)
* [CVE-2023-5100](CVE-2023/CVE-2023-51xx/CVE-2023-5100.json) (`2023-10-09T13:15:10.487`)
* [CVE-2023-5101](CVE-2023/CVE-2023-51xx/CVE-2023-5101.json) (`2023-10-09T13:15:10.557`)
* [CVE-2023-5102](CVE-2023/CVE-2023-51xx/CVE-2023-5102.json) (`2023-10-09T13:15:10.627`)
* [CVE-2023-5103](CVE-2023/CVE-2023-51xx/CVE-2023-5103.json) (`2023-10-09T13:15:10.697`)
* [CVE-2022-35950](CVE-2022/CVE-2022-359xx/CVE-2022-35950.json) (`2023-10-09T14:15:10.437`)
* [CVE-2023-25822](CVE-2023/CVE-2023-258xx/CVE-2023-25822.json) (`2023-10-09T14:15:10.547`)
* [CVE-2023-36820](CVE-2023/CVE-2023-368xx/CVE-2023-36820.json) (`2023-10-09T14:15:10.640`)
* [CVE-2023-41660](CVE-2023/CVE-2023-416xx/CVE-2023-41660.json) (`2023-10-09T14:15:10.723`)
* [CVE-2023-43643](CVE-2023/CVE-2023-436xx/CVE-2023-43643.json) (`2023-10-09T14:15:10.797`)
* [CVE-2023-44378](CVE-2023/CVE-2023-443xx/CVE-2023-44378.json) (`2023-10-09T14:15:10.873`)
* [CVE-2023-44393](CVE-2023/CVE-2023-443xx/CVE-2023-44393.json) (`2023-10-09T15:15:10.057`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
* [CVE-2023-39928](CVE-2023/CVE-2023-399xx/CVE-2023-39928.json) (`2023-10-09T15:15:09.890`)
## Download and Usage