-
Notifications
You must be signed in to change notification settings - Fork 533
Asrar mared/advisory improvement 7038 #7075
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
7203f64
d6d6c97
624ae4c
0be8ae2
4ef3aa1
0a0ba0f
a70887b
5c0e07c
2e5cf78
0bb5d2b
0083c7c
175bf9c
600a0a3
51aad82
5b7321c
67ec8ed
c7b29b3
c14bf0f
2f7e08e
41148b5
b79537e
81336c8
799717c
aa4d96d
fe8107c
44697e2
f462145
538d183
32a17ae
089089d
488a79e
450add9
0874b56
76ad3dc
9279da8
6ea42f1
618fadc
ead68b2
465ccbb
33f1945
20d53d5
0de16c6
3b3e802
78f91be
58c895b
2649f9d
de9540d
2869df6
56cbd5f
cc944bc
bbedc4f
8290b32
a57d901
d1b99fb
24430b5
1ac0f74
760bb6b
8b065cc
2f05351
e5f2c22
6b2fe29
cc905f2
38f4067
ae16c8d
fbdb304
2a4cc40
03399a2
8b38a69
86b2861
7b0594e
f9e9f64
e4ed87a
da86798
4f3178c
f6494f1
f0ae703
9e37ed4
6ecbb5d
5c53a25
2112e7a
16b4db1
1f80578
4d1cb89
c06dd00
abeec1b
4892a03
ef3ccde
caae1cc
15ca792
f9abce7
ebf4870
3c5089d
d19ea1e
a8170f7
583028d
7b171aa
c0da40a
4a25af6
715a73b
1cb2f15
b81a27c
44095bd
30c3276
6fbb688
493d991
9632124
1b8b37e
5552854
2ab36c6
a53df6e
90d3ff7
241db5f
03f1c80
ace7bff
395d01f
a1043d8
f58705f
d56d988
153075b
8bd7c1f
86cca5d
e323cf2
ee45bba
131b189
4088f0c
819404a
2f2f37a
895a0c3
c4a8d9a
66ce563
df24333
bc90ce7
661e2a1
60eb5cc
cdb3c51
25b7d8a
b6c5c52
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,13 +1,13 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-5mg8-w23w-74h3", | ||
| "modified": "2023-08-18T15:56:36Z", | ||
| "modified": "2026-02-23T22:45:53Z", | ||
| "published": "2021-03-25T17:04:19Z", | ||
| "aliases": [ | ||
| "CVE-2020-8908" | ||
| ], | ||
| "summary": "Information Disclosure in Guava", | ||
| "details": "A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.\n", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "details": "A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava |
||
| "details": "A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.", | ||
| "severity": [ | ||
| { | ||
| "type": "CVSS_V3", | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-8v38-pw62-9cw2", | ||
| "modified": "2025-12-20T03:15:43Z", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-20T19:56:16Z", |
||
| "modified": "2026-02-20T19:56:16Z", | ||
| "published": "2022-02-18T00:00:33Z", | ||
| "aliases": [ | ||
| "CVE-2022-0639" | ||
|
|
@@ -25,7 +25,7 @@ | |
| "type": "ECOSYSTEM", | ||
| "events": [ | ||
| { | ||
| "introduced": "0" | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
| "introduced": "1.0.0" | ||
| }, | ||
| { | ||
| "fixed": "1.5.7" | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-rqff-837h-mm52", | ||
| "modified": "2022-02-24T14:00:06Z", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-20T19:56:07Z", |
||
| "modified": "2026-02-20T19:56:07Z", | ||
| "published": "2022-02-15T00:02:46Z", | ||
| "aliases": [ | ||
| "CVE-2022-0512" | ||
|
|
@@ -25,7 +25,7 @@ | |
| "type": "ECOSYSTEM", | ||
| "events": [ | ||
| { | ||
| "introduced": "0" | ||
| "introduced": "0.1.0" | ||
| }, | ||
| { | ||
| "fixed": "1.5.6" | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-gx7g-wjxg-jwwj", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-18T23:33:34Z", |
||
| "modified": "2022-04-18T22:17:42Z", | ||
| "modified": "2026-02-18T23:33:34Z", | ||
| "published": "2022-04-04T00:00:55Z", | ||
| "aliases": [ | ||
| "CVE-2022-0088" | ||
|
|
@@ -52,6 +52,10 @@ | |
| "type": "WEB", | ||
| "url": "https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59" | ||
| }, | ||
| { | ||
| "type": "WEB", | ||
| "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-0088.md" | ||
| }, | ||
| { | ||
| "type": "PACKAGE", | ||
| "url": "https://github.com/yourls/yourls" | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-mg5h-rhjq-6v84", | ||
| "modified": "2022-11-01T20:35:47Z", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-18T23:33:51Z", |
||
| "modified": "2026-02-18T23:33:51Z", | ||
| "published": "2022-10-31T12:00:18Z", | ||
| "aliases": [ | ||
| "CVE-2022-3766" | ||
|
|
@@ -44,6 +44,10 @@ | |
| "type": "WEB", | ||
| "url": "https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d" | ||
| }, | ||
| { | ||
| "type": "WEB", | ||
| "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-3766.md" | ||
| }, | ||
| { | ||
| "type": "PACKAGE", | ||
| "url": "https://github.com/thorsten/phpmyfaq" | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-cp9c-phxx-55xm", | ||
| "modified": "2022-12-12T22:08:01Z", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-18T23:34:01Z", |
||
| "modified": "2026-02-18T23:34:01Z", | ||
| "published": "2022-12-11T15:30:45Z", | ||
| "aliases": [ | ||
| "CVE-2022-4407" | ||
|
|
@@ -44,6 +44,10 @@ | |
| "type": "WEB", | ||
| "url": "https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5" | ||
| }, | ||
| { | ||
| "type": "WEB", | ||
| "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2022-4407.md" | ||
| }, | ||
| { | ||
| "type": "PACKAGE", | ||
| "url": "https://github.com/thorsten/phpmyfaq" | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,13 +1,13 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-5pxr-7m4j-jjc6", | ||
| "modified": "2025-03-19T14:49:46Z", | ||
| "modified": "2026-02-18T23:46:36Z", | ||
| "published": "2024-06-07T19:37:10Z", | ||
| "aliases": [ | ||
| "CVE-2024-37160" | ||
| ], | ||
| "summary": "Cross-site scripting (XSS) vulnerability in Description metadata", | ||
| "details": "### Summary\nRegardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.\n\n### Impact\nThis vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.\n\n### Patches\n- [**Formwork 1.13.1**](https://github.com/getformwork/formwork/releases/tag/1.13.1) has been released with a patch that solves this vulnerability by escaping all metadata attributes.\n- [**Formwork 2.x** (f531201)](https://github.com/getformwork/formwork/commit/f5312015a5a5e89b95ef2bd07e496f8474d579c5) also escapes metadata attributes.\n\n### Details\nAn attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).\n\n### PoC\n1. Log in with an Administrator user account.\n2. Navigate to /panel/options/site/.\n3. Inject the JS script by adding to the description field.\n4. Simulate a victim who is not a site member visiting the website. You will notice that the JS script executes on every page they vis\n\n\n\n\n", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "details": "### Summary\nRegardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.\n\n### Impact\nThis vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.\n\n### Patches\n- Formwork 1.13.1 has been released with a patch that solves this vulnerability by escaping all metadata attributes.\n- Formwork 2.x (f531201) also escapes metadata attributes.\n\n### Details\nAn attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).", |
||
| "details": "### Summary\nRegardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.\n\n### Impact\nThis vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.\n\n### Patches\n- [**Formwork 1.13.1**](https://github.com/getformwork/formwork/releases/tag/1.13.1) has been released with a patch that solves this vulnerability by escaping all metadata attributes.\n- [**Formwork 2.x** (f531201)](https://github.com/getformwork/formwork/commit/f5312015a5a5e89b95ef2bd07e496f8474d579c5) also escapes metadata attributes.\n\n### Details\nAn attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).", | ||
| "severity": [ | ||
| { | ||
| "type": "CVSS_V3", | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,11 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-c85w-x26q-ch87", | ||
| "modified": "2025-03-16T17:19:23Z", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "modified": "2026-02-18T23:47:37Z", |
||
| "modified": "2026-02-18T23:47:37Z", | ||
| "published": "2025-03-01T00:11:52Z", | ||
| "aliases": [], | ||
| "summary": "Formwork improperly validates input of User role preventing site and panel availability", | ||
| "details": "### Summary\n\nImproper validation of select fields allows attackers to craft an input that crashes the system, resulting in a 500 status and making the entire site and administration panel unavailable.\nThis clearly impacts the Availability aspect of the CIA triad (confidentiality, integrity, and availability), although the attack still has certain limitations.\n\n### Details\n\nThe attack involves injecting any invalid user role value (e.g. \">\") into the Role=User parameter in the /panel/users/{name}/profile page, which is the user profile update page.\nDoing this will change the users data in a way that prevents users and then the entire site from loading. Even though the actual data change is minimal, the error is unrecoverable until a valid role parameter is restored by direct modification of the user account file.\nProper validation of select fields will prevent extraneous valid from being accepted and making the entire site and administration panel unavailable.\n\n### Patches\n- [**Formwork 2.x** (d9f0c1f)](https://github.com/getformwork/formwork/commit/d9f0c1feb3b9855d5bdc8bb189c0aaab2792e7ca) adds proper validation to select fields.\n\n### Impact\n\nThe condition for this attack is having high privileges or Admin access, which means it could be exploited by an Insider Threat. Alternatively, if an attacker gains access to a privileged user account, they can execute the attack as well.\nOverall, the attack is relatively difficult to carry out, but if successful, the impact and damage would be significant.\n\n### PoC\n\n\n\n1. Intercept the request and inject an input that will trigger an error.\n\n\n\n\n\n2.After that, it will be observed that the system is shut down or completely broken. Even changing the browser or resetting the server will not be able to restore it.", | ||
| "details": "### Summary\nImproper validation of select fields allows attackers to craft an input that crashes the system, resulting in a 500 status and making the entire site and administration panel unavailable.\nThis clearly impacts the Availability aspect of the CIA triad (confidentiality, integrity, and availability), although the attack still has certain limitations.\n\n### Details\nThe attack involves injecting any invalid user role value. Doing this will change the users data in a way that prevents users and then the entire site from loading. Even though the actual data change is minimal, the error is unrecoverable until a valid role parameter is restored by direct modification of the user account file.\nProper validation of select fields will prevent extraneous valid from being accepted and making the entire site and administration panel unavailable.\n\n### Patches\n- [**Formwork 2.x** (d9f0c1f)](https://github.com/getformwork/formwork/commit/d9f0c1feb3b9855d5bdc8bb189c0aaab2792e7ca) adds proper validation to select fields.\n\n### Impact\nThe condition for this attack is having high privileges or Admin access, which means it could be exploited by an Insider Threat. Alternatively, if an attacker gains access to a privileged user account, they can execute the attack as well.\nOverall, the attack is relatively difficult to carry out, but if successful, the impact and damage would be significant.", | ||
| "severity": [ | ||
| { | ||
| "type": "CVSS_V3", | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,11 @@ | ||
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-vf6x-59hh-332f", | ||
| "modified": "2025-03-17T20:27:03Z", | ||
| "modified": "2026-02-18T23:47:22Z", | ||
| "published": "2025-03-01T00:11:46Z", | ||
| "aliases": [], | ||
| "summary": " Formwork has a cross-site scripting (XSS) vulnerability in Site title", | ||
| "details": "### Summary\n\nThe site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users.\n\n### Impact\n\nThe attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability.\n\n### Patches\n- [**Formwork 2.x** (aa3e9c6)](https://github.com/getformwork/formwork/commit/aa3e9c684035d9e8495169fde7c57d97faa3f9a2) escapes site title from panel header navigation.\n\n### Details\n\nBy embedding \"<!--\", the source code can be rendered non-functional, significantly impacting system availability. However, the attacker would need admin privileges, making the attack more difficult to execute.\n\n### PoC\n\n\n\n1. The page where the vulnerability was found, and the attack surface is the Title field.\n\n\n2. I tested accessing the Dashboard page using a regular user account with Firefox, a different browser, and found that it was also affected.\n\n\n3. Additionally, the remaining code was commented out to disrupt the UX/UI, making it difficult to revert the settings.", | ||
|
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "details": "### Summary\n\nThe site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users.\n\n### Impact\n\nThe attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability.\n\n### Patches\n- Formwork 2.x (aa3e9c6) escapes site title from panel header navigation.\n\n### Details\n\nBy embedding "<!--", the source code can be rendered non-functional, significantly impacting system availability. However, the attacker would need admin privileges, making the attack more difficult to execute.", |
||
| "details": "### Summary\n\nThe site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users.\n\n### Impact\n\nThe attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability.\n\n### Patches\n- [**Formwork 2.x** (aa3e9c6)](https://github.com/getformwork/formwork/commit/aa3e9c684035d9e8495169fde7c57d97faa3f9a2) escapes site title from panel header navigation.\n\n### Details\n\nBy embedding \"<!--\", the source code can be rendered non-functional, significantly impacting system availability. However, the attacker would need admin privileges, making the attack more difficult to execute.", | ||
| "severity": [ | ||
| { | ||
| "type": "CVSS_V3", | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"modified": "2026-02-23T22:45:53Z",