Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-399p-vq28-5hg8: keynote Cross-site Scripting vulnerability

A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability.

ghsa
#xss#vulnerability#git
GHSA-w6qf-j4qr-f946: Froxlor Improper Authorization vulnerability

Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.

GHSA-6gwx-gw56-qhf7: Froxlor vulnerable to Cross-Site Request Forgery

Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.

GHSA-x9p9-v3x6-68mq: usememos/memos vulnerable to Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.

GHSA-8w5q-5fpq-v4pm: usememos/memos Cross-site Scripting vulnerability

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.

GHSA-gvfj-fxx3-j323: Mellium vulnerable to authentication failure or insufficient randomness used during authentication

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

GHSA-3v7m-2jrh-vc93: Froxlor vulnerable to Argument Injection

Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.

GHSA-q2fj-6h62-59m2: Apiman Vert.x Gateway has Transitive Hazelcast connection caching issue

### Impact If you are using the **Apiman Vert.x Gateway** prior to Apiman 3.0.0.Final, a connection caching issue in Hazelcast could allow an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity. Hazelcast is a transitive dependency of the Apiman Vert.x Gateway. The precise risk is difficult to quantify at this juncture as plugins deployed by users may make use of Hazelcast in a different manner to the main Apiman codebase. If any of your custom Apiman plugins specify Hazelcast dependencies, you should also bump these versions. Hint: an easy way to track Apiman dependency versions is to use `apiman-parent`. If you use the Apiman Tomcat or WildFly Gateway this does not affect you. ### Patches Upgrade to **Apiman 3.0.0.Final or later**. If you are using an older version of Apiman and need to remain on that version, contact to your Apiman support provider for advice/long-term support. ### Workarounds Non...

GHSA-6whj-8g9g-5jvx: usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges

Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.

GHSA-9p62-x3c5-hr5p: Path Traversal In MeterSpere leads to upload file to any path

### Summary MeterSphere allow users to upload file, but not check the file name, may lead to upload file to any path if the file name in upload request is falsified. ### Details Metersphere's [`FileUtils.java`](https://github.com/metersphere/metersphere/blob/v2.5.0/framework/sdk-parent/sdk/src/main/java/io/metersphere/commons/utils/FileUtils.java#L57) didn't check the filePath. ```java public static void createFile(String filePath, byte[] fileBytes) { File file = new File(filePath); if (file.exists()) { file.delete(); } try { File dir = file.getParentFile(); if (!dir.exists()) { dir.mkdirs(); } file.createNewFile(); } catch (Exception e) { LogUtil.error(e); } try (InputStream in = new ByteArrayInputStream(fileBytes); OutputStream out = new FileOutputStream(file)) { final int MAX = 4096; byte[] buf = new byte[MAX...