Security
Headlines
HeadlinesLatestCVEs

Tag

#git

GHSA-2rmr-xw8m-22q9: Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint

### Impact An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This could open door for other attack vectors: * client-side vulnerabilities: XSS/CSRF in the context of the trusted domain; * interaction with internal network; * read cloud metadata endpoints (AWS, Azure, Google Cloud, etc.); * local/remote port scan. This issue only affects users who have [Next.js SDK tunneling feature](https://docs.sentry.io/platforms/javascript/guides/nextjs/manual-setup/#configure-tunneling-to-avoid-ad-blockers) enabled. ### Patches The problem has been fixed in [sentry/[email protected]](https://www.npmjs.com/package/@sentry/nextjs/v/7.77.0) ### Workarounds Disable tunneling by removing the `tunnelRoute` option from Sentry Next.js SDK config — `next.config.js` or `next.config.mjs`. ### References * [Sentry Next.js tunneling feature](https://docs.sentry.io/platforms/javascript/guides/nextjs/manual-setup/#confi...

ghsa
#xss#csrf#vulnerability#web#google#nodejs#js#git#java#ssrf
GHSA-4qhc-v8r6-8vwm: HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability

HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.

GHSA-9gqp-3g28-w9xc: Moodle Cross-site Scripting vulnerability

The course upload preview contained an XSS risk for users uploading unsafe data.

GHSA-5cvx-cwpx-9rjh: Moodle Code Injection vulnerability

In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.

GHSA-jr83-8x65-xcr5: Moodle Exposure of Sensitive Information to an Unauthorized Actor vulnerability

Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

GHSA-26fg-v32r-h663: Moodle Exposure of Sensitive Information to an Unauthorized Actor vulnerability

H5P metadata automatically populated the author with the user's username, which could be sensitive information.

GHSA-cwh2-q44x-5w3c: Moodle Acceptance of Extraneous Untrusted Data With Trusted Data vulnerability

Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.

GHSA-j5xf-gv89-g422: Moodle Cross-site Scripting vulnerability

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

GHSA-fm5h-58g2-4m3f: Moodle Improper Access Control vulnerability

Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.

GHSA-w8x2-w4qr-v3x4: Moodle Code Injection vulnerability

A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.