Skip to content

Underground News

Header Image
Category

HIGH

16 Posts

Featured

Posted byGitHub
[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists
Posted byGitHub
[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification
Posted byGitHub
[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Posted byGitHub
[github.com/graphql-go/graphql] graphql-go through 0.8.0 has infinite recursion in the type definition parser

[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

cosign verify-attestation used with the –type flag will report a false positive verification when:

There is at least one attestation with a valid signature
There are NO attestations of the type being verified (–type defaults to “custom”)

This can h…

[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

PolicyController will report a false positive, resulting in an admission when it should not be admitted when:

There is at least one attestation with a valid signature
There are NO attestations of the type being verified (–type defaults to “custom”)

…

[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths

  • Posted inHIGH
  • Posted byGitHub
  • 08/11/202208/11/2022

The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cr…

[github.com/graphql-go/graphql] graphql-go through 0.8.0 has infinite recursion in the type definition parser

  • Posted inHIGH
  • Posted byGitHub
  • 08/02/202208/11/2022

graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-37315
https://github.com/graphql-go/graphql/issues/637
https://github.com/advisories/GHSA-h3qm-jrr…

[org.eclipse.californium:californium-core] Eclipse Californium denial of service (DoS) via Datagram Transport Layer Security (DTLS) handshake on parameter mismatch

  • Posted inHIGH
  • Posted byGitHub
  • 07/30/202208/11/2022

In Eclipse Californium versions 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that re…

[org.jenkins-ci.plugins:git] Jenkins Git Plugin before 4.11.4 is missing a permission check

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
Reference…

[org.jenkins-ci.plugins:git-client] Jenkins Git client plugin 3.11.0 does not perform SSH host key verification

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

Jenkins Git client plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks. Git client plugin 3.11.1 provides strategies for performing host key verification f…

[org.jenkins-ci.plugins:git] Jenkins Git Plugin before 4.11.4 allows attackers to trigger builds of jobs to use an attacker-specified Git repo

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
Re…

[org.jenkins-ci.plugins:deployer-framework] Jenkins Deployer Framework Plugin does not restrict application path of applications when configuring a deployment

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins contro…

[com.compuware.jenkins:compuware-ispw-operations] Jenkins Compuware ISPW Operations Plugin before 1.0.9 vulnerable to protection mechanism failure

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
References

https://nvd.nist.gov/vuln…

Posts navigation

1 2 Next Posts
Underground News
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close