Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-cfxh-frx4-9gjg: Cross-site Scripting in @spscommerce/ds-react

### Impact XSS, anyone using the SPS Select with options prop populated from user input is impacted. If these options are stored, then it could have been a stored XSS. ### Patches The code has been patched for version 7 of woodland. Users should upgrade to 7.17.4 or higher ### Workarounds This is not recommended. If you are not upgrading then you would need to sanitize your options yourself (including those currently stored in databases). This is not recommended. ### References https://github.com/SPSCommerce/woodland/blob/c49e999f97f3c0b56502859f4de1e8c6666dd74d/packages/ds-react/src/option-list/SpsOptionList.tsx#L559

ghsa
#xss#nodejs#git
GHSA-f6gv-hh8j-q8vq: Named path parameters can be overridden in TrieRouter

### Impact The clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. The code to reproduce it. The server side application: ```ts import { Hono } from 'hono' import { TrieRouter } from 'hono/router/trie-router' const wait = async (ms: number) => { return new Promise((resolve) => { setTimeout(resolve, ms) }) } const app = new Hono({ router: new TrieRouter() }) app.use('*', async (c, next) => { await wait(Math.random() * 200) return next() }) app.get('/modules/:id/versions/:version', async (c) => { const id = c.req.param('id') const version = c.req.param('version') console.log('path', c.req.path) console.log('version', version) return c.json({ id, version, ...

GHSA-5968-qw33-h47j: Duplicate Advisory: Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri

## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-cvg2-7c3j-g36j. This link is maintained to preserve external references. ## Original Description A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

GHSA-xv7p-jw46-8r85: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office.

GHSA-3hf6-f8ch-5869: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via carousel image editing.

GHSA-m3p6-43xj-pf9v: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing.

GHSA-p3ph-6245-4wfc: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).

GHSA-gqrq-j6pm-98c2: External Control of File Name or Path in h2oai/h2o-3

Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with "C1", if they're exporting as CSV.

GHSA-hhw5-c326-822h: Open redirect in Apache Shiro

URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.

GHSA-9759-3276-g2pm: Denial of service attack on the cube-api endpoint

### Impact It is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. ### Patches The issue has been patched in the `v0.34.34` and it's recommended that all users exposing Cube APIs to the public internet upgrade to the latest version to prevent service disruption. ### Workarounds There are currently no workaround for older versions, and the recommendation is to upgrade. ### References The issue was reported by an independent researcher in our Community Slack and has been promptly patched in the recent update.