Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-hq4m-4948-64cc: Kyverno resource with a deletionTimestamp may allow policy circumvention

### Impact In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being consciously exempted by Kyverno, as a way to reduce processing load as policies are typically not applied to objects which are being deleted. However, this could potentially result in allowing a malicious user to leverage the [Kubernetes finalizers feature](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/) by setting a finalizer which causes the Kubernetes API server to set the `deletionTimestamp` and then not completing the delete operation as a way to explicitly to bypass a Kyverno policy. Note that this is not applicable to Kubernetes Pods but, as an example, a Kubernetes Service resource can be manipulated using an indefinite finalizer to byp...

ghsa
#git#kubernetes
GHSA-gqx9-h3w2-fprg: Gitpod vulnerable to Cross-site Scripting

Gitpod before 2022.11.3 allows XSS because redirection can occur for some protocols outside of the trusted set of three (vscode: vscode-insiders: jetbrains-gateway:).

GHSA-7gf7-jv65-wjmh: xml-rs vulnerable to denial of service via invalid token in XML document

The xml-rs crate before 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document.

GHSA-g3jr-6vj4-3x82: TeamPass vulnerable to Improper Access Control

Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

GHSA-j245-v2mh-5h6f: TeamPass vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

GHSA-8vm8-38pc-8xhh: TeamPass vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

GHSA-c6fv-3jm9-6r8f: TeamPass vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

GHSA-rqjq-ww83-wv5c: Hashicorp Consul allows user with service:write permissions to patch remote proxy instances

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

GHSA-c57c-7hrj-6q6v: Hashicorp Consul vulnerable to denial of service

Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3

GHSA-7xpv-4pm9-xch2: mx-chain-go does not treat invalid transaction with wrong username correctly

### Impact Metachain cannot process a cross-shard miniblock. An invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. ### Patches Introduce processIfTxErrorCrossShard for metachain transaction processor. ### Workarounds No ### References No