Headline
CVE-2022-0540: Jira Security Advisory 2022-04-20 | Atlassian Support
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
App Name
Affected Versions
Notes
Activity for Jira
Versions < 2.3.0
Activity Timeline: Resource Planning & Time Tracking
Versions < 9.1.4
Alfresco connector for Jira
Versions < 1.15.3-8
Agile Tools & Filters for Jira Software
Versions < 4.0.12
Agile User Story Map & Product Roadmap for Jira
Versions < 6.4.1
🇺🇦 Alert Catcher - Jira integration with Zabbix SIEM
Versions < 2.0.10
aqua - Test Management & Automation
All versions
ARCAD For Jira
All versions
Atlas CRM - Customers and Sales in Jira
Versions < 1.9.10
Automated Log Work for Jira
Versions < 6.9.5
AutoPage - Automated Page Creation
Versions < 2.15.0
BDQ Migration Analyst for Jira Cloud
Versions < 1.0.2
Calculated and other custom fields(JBCF) for Jira DC/Cloud
Versions < 3.1.3
Calendar for Jira
All versions
The app vendor notes that all affected actions enforce additional permission checks that are not vulnerable to CVE-2022-0540
🇺🇦 Cisco Finesse integration for Jira
Versions < 1.0.7
CodeRunner PRO
All versions
Comala Agile Ranking
Versions < 1.6.0
Comala Canvas for Jira
Versions < 3.0.5
Comment History for Jira
Versions < 2.2.1
Comment Security Default
Versions < 4.0.1
Connector for Salesforce and Jira Server
Versions < 1.14.1-8
Control Freak
Versions < 1.0.7
Cross filters matrix
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Custom Select List
All versions
Customfield Editor for Jira
Versions < 2.13.1
Customizable Announcements for Jira
Versions < 2.2.0
Decision Tables for Jira
Versions < 1.2.10
Default Values for ‘Create Issue’ screen
Versions < 4.2.8
Delegating group management
Versions < 3.0.6
Denkplan Portfolio Map for Jira
Versions < 2.2.0
Dependent Select List
All versions
Display linked issues
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Document Vault for Jira
Versions < 5.2.1
e Matrix
Versions < 3.1.2
Easy Field Template
All versions
Eclipse BIRT for SQL+JQL
Versions < 3.6.6
EduBrite LMS for Jira Service Management
Versions < 3.41.12
Elevator - Smart Issue Assignment
Versions < 3.10.2
Encryption for Jira
Versions < 1.7.21
Enterprise Mail Handler for Jira (JEMH)
Server versions < 3.3.86-server
Data Center versions < 3.3.85-dc
Epic watcher
Versions < 1.0.2
Excel-like Issue Editor for Jira - Embed Spreadsheet & Table
Versions < 1.17.1.1
excentia Admin Tools for Jira
Versions < 2.13.2
Extender for Jira
Versions < 2.16.0
Feedback for Jira - Forms for website
All versions
Field Hide for Jira
All versions
Field Hide for Jira - Lite
All versions
Figma for Jira
Versions < 2.2.2
Flexible Calendar for Jira
Versions < 2.9.2
Frontu Field Service Management Add-on
All versions
Gamification for Jira
All versions
GDPR (DSGVO) and Security for Jira
Versions < 1.18.1
Gears desk for Jira
Versions < 2.4.3
Gears issue export permission
Versions < 2.4.1
Gears Lock manager for jira
Versions < 1.3.1
Gears Properties Manager
Versions < 1.5.1
Gears Usage Statistics for jira
Versions < 1.4.2
Gears worklog-restricted for Jira
All versions
Git Integration for Jira
Versions < 4.2.1
Google Analytics for Jira
All versions
Group Ambassadors
Versions < 2.4.1
Groups Plus - Attributes and delegated management
Versions < 1.0.3.15
Home Directory, Database & Log Browser for Jira
Versions < 1.34.1
ID Generator for Jira
All versions
Import Export for Jira + Structure - Microsoft Project
Versions < 1.4.6
Insight - Asset Management
Versions < 8.10.0
All 9.x versions
Bundled with Jira Service Management 4.15 and later.
Customers using Jira Service Management 4.15.0 or later cannot install Insight 8.10.0 via UPM, and should install one of the updated versions of Jira Service Management noted in this advisory or see the Workarounds section below.
An authenticated attacker with object schema manager permissions could exploit this vulnerability to execute arbitrary code.
InstaPrinta - Print Jira Issues directly
Versions < 2.9.0
iridion for JIRA
All versions
Issue Actions Todo
Versions < 3.1.1
Issue Linked Event for Jira
Versions < 1.12.0
Issue Search Customiser for Jira
Versions < 1.3.4
Issues Toolbox for Jira
Versions < 2.1.2
It’s a Feature, Not a Bug
All versions
J2J Issue Sync
All versions
Jenkins Integration for Jira
Versions < 5.8.0
Jenkins Integration for Jira - Lite
Versions < 5.8.0
Jira Misc Custom Fields (JMCF)
Versions < 2.4.6
Jira Misc Workflow Extensions (JMWE)
Versions < 7.1.4
Jira Workflow Toolbox
Versions < 3.1.5
JsIncluder
All versions
Label Manager for Jira
Versions < 4.7.8
Legal for Jira
All versions
This app is no longer supported and has been archived.
Log Tailer for Jira
Versions < 1.2.3
Lync and Skype Connector for Jira
All versions
Message field
Versions < 4.6.6
Metadata for Jira
Versions < 4.8.6
The app vendor notes that all affected actions enforce additional permission checks that are not vulnerable to CVE-2022-0540
Microfocus Dimensions CM Integration
All versions
ML1
All versions
Mobile Plugin for Jira Data Center and Server
Versions < 3.2.14
Bundled with Jira and JSM
Atlassian has determined the security risk is negligible since all affected actions enforce additional permission checks that are not vulnerable to CVE-2022-0540
MOCO Time Tracking for Jira
Versions < 1.3.5
Multiple Checklists for Jira
Versions < 1.17.2
My Secret Santa for Jira
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
My Service Portal
Versions < 2.1.14.20220412102158
My.com Calendar
Versions < 4.2.1
Namo Crosseditor For Jira
Versions < 1.0.13
Notify Watcher
Versions < 1.7.2
NotifyMe! - Send emails from Jira issues
Versions < 2.0.12
One-time Link
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Organizations Automation
Versions < 2.10.2
PageMe! - Create Pages from Jira Issues
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Performance Objectives: Charts for Jira
Versions < 22.4.4
PractiTest Test Management for Jira
All versions
Prevent Anonymous Access
Versions < 3.1.0
ProScheduler: Resource Planning & Gantt - Project Management
Versions < 4.1.0
Project Archiver for Jira
Versions < 1.4.0
Project Budget for Jira
Versions < 1.2.0
Project Creator
All versions
Project Documents for Jira
Versions < 3.9.1
Project Specific Select Field
Versions < 3.0.2
Project User Manager (PUM)
Versions < 1.2.5
Projectrak - Project Tracking for Jira
Versions < 8.8.2
Projektron BCS Connector for Jira
All versions
QA Craft Test Management for Jira
Server versions < 4.1.20
Data Center versions < 4.1.21
QAlity - Test Management for Jira
All versions
QAlity Plus - Test Management for Jira
All versions
Quality Tiger - Test Management for Jira
All versions
Quick Subtasks for Jira
All versions
Raley Favourites for Jira
Versions < 1.1.1
ReceiveMe! - Email handler for Jira
Versions < 2.0.17
Refined for Jira | Sites & Themes
Versions 3.3.x < 3.3.4
Versions < 3.2.21
RemindMe for Jira
Versions < 1.3.5
Report Builder
Versions < 3.9.1
Run CLI Actions in Jira
Versions < 10.2.1
SCIM User Provisioning for Jira
Versions < 2.7.1
Search by workflows
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Secure Admin for Jira
Versions < 3.4.2
Secure Code Warrior® for Jira
All versions
Security Attachment Manager for Jira
Versions < 1.0.8
Security Fields and Attachments
All versions
Service Desk Menu for Jira
Versions < 1.4.0
SharedManager
All versions
Sign Off Plugin for Jira
Versions < 1.2.0
SIL Groovy Connector
Versions < 1.1.8
Simple Tasklists
All versions
Simple Team Pages for Jira
All versions
Simple notifications for Jira
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
SLA
All versions
Smart Checklist for Jira. Pro
All versions
Smart Issue Analyzer for Jira
All versions
Smart Issue Analyzer for Jira Align
All versions
Smart Issue Templates for Jira
Versions < 1.11.13
Sprint Capacity Planning & Tracking
All versions
SQL+JQL Driver: Transform JQL into SQL
Versions < 9.11.3
Status History
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Status History PRO
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Status update reminder for Jira
Versions < 1.0.4
STM for Jira
Versions < 4.4.5
Story Mapping for Jira - Pro
Versions < 3.1.0
SU for Jira
Versions < 1.14.0
Subversion ALM
Versions < 9.3.4
sumUp for Jira
Versions < 3.6.6
swarmOS Analyzer
All versions
Switch to User + Delegating SU (Jira)
Versions < 1.5.2
Sync Sub-Tasks to Parent
All versions
Team Trax: Vacation, holidays, sick leaves tracker for Jira
All versions
The app vendor notes that all affected actions enforce additional permission checks that are not vulnerable to CVE-2022-0540
Teamworkx Issue Picker for Jira
Versions < 8.7.8
Teamworkx Issue Publisher for Jira
Versions < 12.5.1
Teamworkx OTRS Integration for Jira
Versions < 70.40.10.0
Teamworkx Push and Pull Favorites
Versions < 7.0.11.9
Telegram Bot
All versions
Template Manager
Versions < 1.4
TemplateMe! - Customized notifications
Versions < 2.8
Terms and Conditions for Jira
Versions < 2.1.0-5
Testlab for Jira
All versions
Time in status | SLA | Timer | Stopwatch for Jira DC/Cloud
Versions < 5.4.2
Timeline
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Timeline for Jira
Versions < 2.0.4
The app vendor notes that all affected actions for versions < 2.0.4 enforce additional permission checks that are not vulnerable to CVE-2022-0540
Timetracker - Time Tracking & Reporting
Versions < 4.9.8
TodoMe Connector (Jira)
All versions
TodoMe for Jira
All versions
ToDos for Jira Issues
All versions
Translate Field Options for Jira
Versions < 1.3.6
Translator for Jira
All versions
Trophy - gamification for Jira
Versions < 1.0.4
UiPath Test Manager for Jira
All versions
URL Restrictions for Jira
Versions < 1.0.7
User Anonymizer for Jira (GDPR)
Versions < 2.0.5
User Availability Tracker for Jira
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
User Management by Project Administrator
Versions < 82000.1.14
User Mention Groups for the Richtext Editor
All versions
User Picker Avatar for Jira
Versions < 3.5.0
User Profiles for Jira
Versions < 2.4.5
User Switcher for Jira
Versions < 3.1.1
VCAP - Video Capture for Jira Service Management
All versions
Version & Component Sync for Jira
Versions < 2.9.7
VIP.LEAN TOOLS - Advanced Links
Versions < 1.1.4
vLinks - Easy Issue Linking
Versions < 2.3.2-25ca8af
Watch It for Jira
Versions < 3.1.2
WBS Gantt-Chart for Jira
Versions < 9.14.4.1
Whiteboards for Jira: team collaboration
Versions < 1.51.2
Who deleted my issues
All versions
Workflow Magic Box
Versions < 1.12-RELEASE
Worklog History PRO
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Worklog express
Versions < 8.5.5-SNAPSHOT
Worklogs - Time Tracking and Reports
Versions < 1.4.3
xCharts - Custom Charts & Reports for Jira
Versions < 1.7.8
xPort - Custom Worklog Export for Jira
Versions < 1.2.1
Xporter - Export issues from Jira
All versions
The app vendor advises customers to remediate this vulnerability by installing a fixed version of Jira.
Related news
Logging Subsystem 5.4 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter
acs commons is an open source framework for AEM projects. ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. This issue has been resolved in 5.2.0. There are no known workarounds for this issue.
Updated Satellite 6.9 packages that fix several bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-27023: puppet: unsafe HTTP redirect
HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.
Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml...
Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml2: Use-after-free in xmlXIncludeDoProcess() in xinc...
Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the [email protected]. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.
Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.
wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-03-30-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0), so that their applications are no longer affected. There are no known workarounds for this issue. ### Patches * The issue has been fixed in wire-webapp **2022-03-30-production.0** an...
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
Oracle's April Critical Patch UPdate contains 520 new security patches. We spell out some of the most important vulnerabilities. The post Oracle releases massive Critical Patch Update containing 520 security patches appeared first on Malwarebytes Labs.
A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
Red Hat OpenShift Container Platform release 4.9.29 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...
Red Hat OpenShift Container Platform release 4.7.49 is now available with updates to packages and images that fix several bugs and add enhancements. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.49. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0711: haproxy: Denial of service via set-cookie2 header
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) *...
Red Hat OpenShift Container Platform release 4.8.37 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.37. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.10.10 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Cross-site request forgery (CSRF) vulnerability in 'MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership' versions prior to 1.9.6 allows a remote unauthenticated attacker to hijack the authentication of an administrator and perform unintended operation via unspecified vectors.
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended progra...
next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
The CleanTalk AntiSpam plugin <= 5.173 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter in`/lib/Cleantalk/ApbctWP/FindSpam/ListTable/Users.php`
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
The WordPress WP YouTube Live Plugin is vulnerable to Reflected Cross-Site Scripting via POST data found in the ~/inc/admin.php file which allows unauthenticated attackers to inject arbitrary web scripts in versions up to, and including, 1.7.21.
Smokescreen is a simple HTTP proxy that fogs over naughty URLs. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. Recommended to upgrade Smokescreen to version 0.0.3 or later.
Exploring what's next for public-cloud security, including top risks and how to implement better risk management.
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.