Skip to content

Underground News

Header Image
Author

GitHub

925 Posts

Featured

Posted byGitHub
[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists
Posted byGitHub
[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification
Posted byGitHub
[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Posted byGitHub
[owning_ref] owning_ref vulnerable to multiple soundness issues

[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

cosign verify-attestation used with the –type flag will report a false positive verification when:

There is at least one attestation with a valid signature
There are NO attestations of the type being verified (–type defaults to “custom”)

This can h…

[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

PolicyController will report a false positive, resulting in an admission when it should not be admitted when:

There is at least one attestation with a valid signature
There are NO attestations of the type being verified (–type defaults to “custom”)

…

[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cr…

[owning_ref] owning_ref vulnerable to multiple soundness issues

  • Posted inMODERATE
  • Posted byGitHub
  • 08/11/202208/11/2022

OwningRef::map_with_owner is unsound and may result in a use-after-free.
OwningRef::map is unsound and may result in a use-after-free.
OwningRefMut::as_owner and OwningRefMut::as_owner_mut are unsound and may result in a use-after-free.
The crate viol…

[@ckeditor/ckeditor5-markdown-gfm] CKEditor5 Cross-site scripting caused by the editor instance destroying process

  • Posted inseverity
  • Posted byGitHub
  • 08/06/202208/06/2022

Affected packages
@ckeditor/ckeditor5-markdown-gfm
@ckeditor/ckeditor5-html-support
@ckeditor/ckeditor5-html-embed
Impact
A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5’s packages. The vulnerability allowed…

[drupal/core] Drupal core arbitrary PHP code execution

  • Posted inseverity
  • Posted byGitHub
  • 08/06/202208/06/2022

Drupal core sanitizes filenames with dangerous extensions upon upload and strips leading and trailing dots from filenames to prevent uploading server configuration files.
However, the protections for these two vulnerabilities previously did not work co…

[streamlit] Streamlit directory traversal vulnerability

  • Posted inseverity
  • Posted byGitHub
  • 08/06/202208/06/2022

Impact
Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive informati…

[org.postgresql:postgresql] PostgreSQL JDBC Driver SQL Injection in ResultSet.refreshRow() with malicious column names

  • Posted inseverity
  • Posted byGitHub
  • 08/06/202208/10/2022

Impact
What kind of vulnerability is it? Who is impacted?
The PGJDBC implementation of the java.sql.ResultRow.refreshRow() method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. ;, could …

[org.dspace:dspace-api] DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import

  • Posted inseverity
  • Posted byGitHub
  • 08/06/202208/06/2022

Impact
ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, th…

[org.dspace:dspace-jspui] JSPUI vulnerable to path traversal in submission (resumable) upload

  • Posted inseverity
  • Posted byGitHub
  • 08/06/2022

Impact
The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace use…

Posts navigation

1 2 3 … 93 Next Posts
Underground News
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close