Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-f5q9-j9r2-34gq: Apache Kylin vulnerable to Command injection by Useless configuration

In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the `kylin.engine.spark-cmd` parameter of `conf`.

ghsa
#apache#git
GHSA-w9rv-xmf7-x3gh: Apache Kylin vulnerable to Command injection by Diagnosis Controller

Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request.

GHSA-cwh7-28vg-jmpr: pastebinit Path Traversal vulnerability

A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument `r.URL.Path` leads to path traversal. Upgrading to version 0.2.3 can address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040.

GHSA-xv6x-456v-24xh: gotify/server vulnerable to Cross-site Scripting in the application image file upload

### Impact The XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as: ``` https://push.example.org/image/[alphanumeric string].html ``` An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. ### Patches The vulnerability has been fixed in version 2.2.2. ### Workarounds You can block access to non image files via a reverse proxy in the `./image` directory. ### References https://github.com/gotify/server/pull/534 https://github.com/gotify/server/pull/535 --- Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug.

GHSA-5jqp-wmhj-g33f: usememos/memos Cross-Site Request Forgery vulnerability

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.

GHSA-c5hq-35h7-r9x4: usememos/memos Cross-Site Request Forgery vulnerability

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.

GHSA-rmhx-9h5h-3xh3: usememos/memos vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.

GHSA-gxqf-4g4p-q3hc: usememos/memos vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.

GHSA-pwhr-p68w-296x: usememos/memos vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.

GHSA-642q-2q68-9j3p: usememos/memos Cross-Site Request Forgery vulnerability

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.