Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-qjfx-fvx7-3wvw: Business Logic Errors in microweber/microweber

A vulnerability has been identified in microweber where users can purchase items with a coupon code. If the admin disables the use of the coupon code functionality, but the user sends requests to the API that handles the coupon code, the user can exploit the vulnerability and obtain items at a lower price.

ghsa
#vulnerability#web#git
GHSA-cfxh-frx4-9gjg: Cross-site Scripting in @spscommerce/ds-react

### Impact XSS, anyone using the SPS Select with options prop populated from user input is impacted. If these options are stored, then it could have been a stored XSS. ### Patches The code has been patched for version 7 of woodland. Users should upgrade to 7.17.4 or higher ### Workarounds This is not recommended. If you are not upgrading then you would need to sanitize your options yourself (including those currently stored in databases). This is not recommended. ### References https://github.com/SPSCommerce/woodland/blob/c49e999f97f3c0b56502859f4de1e8c6666dd74d/packages/ds-react/src/option-list/SpsOptionList.tsx#L559

GHSA-f6gv-hh8j-q8vq: Named path parameters can be overridden in TrieRouter

### Impact The clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. The code to reproduce it. The server side application: ```ts import { Hono } from 'hono' import { TrieRouter } from 'hono/router/trie-router' const wait = async (ms: number) => { return new Promise((resolve) => { setTimeout(resolve, ms) }) } const app = new Hono({ router: new TrieRouter() }) app.use('*', async (c, next) => { await wait(Math.random() * 200) return next() }) app.get('/modules/:id/versions/:version', async (c) => { const id = c.req.param('id') const version = c.req.param('version') console.log('path', c.req.path) console.log('version', version) return c.json({ id, version, ...

GHSA-5968-qw33-h47j: Duplicate Advisory: Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri

## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-cvg2-7c3j-g36j. This link is maintained to preserve external references. ## Original Description A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

GHSA-xv7p-jw46-8r85: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office.

GHSA-3hf6-f8ch-5869: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via carousel image editing.

GHSA-m3p6-43xj-pf9v: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing.

GHSA-p3ph-6245-4wfc: Cross-site Scripting in JFinalcms

JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).

GHSA-gqrq-j6pm-98c2: External Control of File Name or Path in h2oai/h2o-3

Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with "C1", if they're exporting as CSV.

GHSA-hhw5-c326-822h: Open redirect in Apache Shiro

URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.