Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-gmj8-84r4-h46j: rdiffweb Cross-Site Request Forgery vulnerability can lead to user email ID being changed

rdiffwen prior to version 2.4.7 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker can change a user's email ID. Version 2.4.7 has a fix for this issue.

ghsa
#csrf#vulnerability#web#git
GHSA-fvf5-xp83-vrqp: ICEcoder vulnerable to Path Traversal

ICEcoder v8.1 allows attackers to execute a directory traversal.

GHSA-74j6-3hh4-w3f5: rdiffweb Cross-Site Request Forgery vulnerability

rdiffweb prior to 2.4.6 is vulnerable to cross-site request forgery on the repository settings. A malicious user can change the settings of a repository by sending a URL to the victim. This issue is fixed in version 2.4.6.

GHSA-5rp4-749p-vx26: Apache Airflow vulnerable to Use of Externally-Controlled Format String

In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.

GHSA-4fg5-j4mm-wfpg: Apache Airflow vulnerable to open redirect

In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint.

GHSA-49wm-4fp6-h59c: OctoPrint vulnerable to Unrestricted Upload of File with Dangerous Type

OctoPrint prior to version 1.8.3 is vulnerable to Unrestricted Upload of File with Dangerous Type. Due to misconfiguration in move file functionality, an attacker could easily change the file extension of an uploaded malicious file disguised as a `.gcode` file. Version 1.8.3 contains a patch.

GHSA-937f-qh3w-6g87: OctoPrint vulnerable to Insufficient Session Expiration.

If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists. This issue is fixed in version 1.8.3.

GHSA-2p75-q37p-f852: OctoPrint Improper Privilege Management vulnerability

OctoPrint prior to 1.8.3 allows a user with read access only to access a privileged user's account and functionality. Version 1.8.3 contains a patch for this issue.

GHSA-wqr6-57qm-hhr5: Pimcore vulnerable to cross site scripting

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can perform any action within the application that the user can perform; view any information that the user is able to view; modify any information that the user is able to modify; and/or initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user. A patch for this issue is available at commit 1e916e7d668c9e47b217e20cc0ea4812f466201b and anticipated to be part of version 10.5.7.

GHSA-pxp5-g66h-wpv2: Jenkins View26 Test-Reporting Plugin improperly validates hostname

Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.