Skip to content

Underground News

Header Image
Author

GitHub

925 Posts

Featured

Posted byGitHub
[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists
Posted byGitHub
[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification
Posted byGitHub
[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Posted byGitHub
[owning_ref] owning_ref vulnerable to multiple soundness issues

[packbackbooks/lti-1-3-php-library] LTI 1.3 Tool Library’s Nonce Claim Value not validated against nonce value sent in Authentication Request before v5.0

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/26/2022

Impact
Nonce Claim Value was not being validated against the nonce value sent in the Authentication Request.
Patches
Users should upgrade to version 5.0 immediately
Workarounds
None.
References

https://github.com/packbackbooks/lti-1-3-php-library/secu…

[packbackbooks/lti-1-3-php-library] LTI 1.3 Tool Library’s function used to generate random nonces not sufficiently cryptographically complex before v5.0

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/26/2022

Impact
The function used to generate random nonces was not sufficiently cryptographically complex. As a result values may be predictable and tokens may be forgable.
Patches
Users should upgrade to version 5.0 immediately
Workarounds
None.
References

h…

[org.togglz:togglz-console] Togglz console missing cross-site request forgery (CSRF) protection

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/16/2022

Togglz is an implementation of the Feature Toggles pattern for Java. There is no CSRF protection in the togglz console and could allow an attacker to guess the CSRF token value. Version 2.9.4 adds the necessary CSRF protection.
References

https://nvd….

[com.amazonaws:aws-java-sdk-s3] Partial Path Traversal in com.amazonaws:aws-java-sdk-s3

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/20/2022

Overview
A partial-path traversal issue exists within the downloadDirectory method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the destinationDirectory argument, but S3 object keys are determin…

[com.fasterxml.jackson.core:jackson-databind] jackson-databind before 2.9.10.4 vulnerable to unsafe deserialization

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/16/2022

The com.fasterxml.jackson.core:jackson-databind library before versions 2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling interactions related to the class ignite-jta.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-…

[oro/commerce] OroCommerce vulnerable to XSS when adding class name to Selector Manager on pages that use GrapeJS editor

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/16/2022

Impact
Due to insufficient class name validation in GrapeJS library it’s possible to add executable JS code in class name through Selector Manager
Relates to

https://github.com/artf/grapesjs/issues/4411

Patch
Update GrapeJS dependency to >=v0.19.5…

[fastify-bearer-auth] Timing Attack Vector in fastify-bearer-auth

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/16/2022

Impact
fastify-bearer-auth does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the …

[openzeppelin-cairo-contracts] OpenZeppelin Contracts for Cairo account cannot process transactions on Goerli

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/20/2022

Impact
This vulnerability affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected.
This fau…

[org.jvnet.hudson.main:hudson-core] Hudson XML API susceptible to External Entity Injection Vunerability prior to v3.3.2

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/21/2022

In versions prior to 3.3.2, Hudson exhibits a flaw in its XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.
References

https://nvd.nist.gov/vuln/detail/CVE-2015-8031
https://wi…

[github.com/flyteorg/flyteadmin] FlyteAdmin Insufficient AccessToken Expiration Check prior to v1.1.30

  • Posted inUncategorized
  • Posted byGitHub
  • 07/16/202207/16/2022

Impact
Authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire.
Using flyteadmin as the OAuth2 Authorization Server is unaffected by this issue.
Patches
1.1.30
Workarounds
Rotating …

Posts navigation

Previous Posts 1 … 13 14 15 16 17 … 93 Next Posts
Underground News
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close