Skip to content

Commit 3376d88

Browse files

File tree

5 files changed

+63
-11
lines changed

5 files changed

+63
-11
lines changed

advisories/github-reviewed/2024/11/GHSA-qvf5-hvjx-wm27/GHSA-qvf5-hvjx-wm27.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qvf5-hvjx-wm27",
4-
"modified": "2024-11-18T21:03:05Z",
4+
"modified": "2025-01-24T21:41:11Z",
55
"published": "2024-11-18T12:30:43Z",
66
"aliases": [
77
"CVE-2024-52317"
@@ -154,6 +154,14 @@
154154
{
155155
"type": "WEB",
156156
"url": "https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs"
157+
},
158+
{
159+
"type": "WEB",
160+
"url": "https://security.netapp.com/advisory/ntap-20250124-0004"
161+
},
162+
{
163+
"type": "WEB",
164+
"url": "http://www.openwall.com/lists/oss-security/2024/11/18/3"
157165
}
158166
],
159167
"database_specific": {

advisories/github-reviewed/2024/11/GHSA-xcpr-7mr4-h4xq/GHSA-xcpr-7mr4-h4xq.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xcpr-7mr4-h4xq",
4-
"modified": "2024-11-18T23:48:03Z",
4+
"modified": "2025-01-24T21:41:16Z",
55
"published": "2024-11-18T12:30:43Z",
66
"aliases": [
77
"CVE-2024-52316"
@@ -100,6 +100,14 @@
100100
{
101101
"type": "WEB",
102102
"url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928"
103+
},
104+
{
105+
"type": "WEB",
106+
"url": "https://security.netapp.com/advisory/ntap-20250124-0003"
107+
},
108+
{
109+
"type": "WEB",
110+
"url": "http://www.openwall.com/lists/oss-security/2024/11/18/2"
103111
}
104112
],
105113
"database_specific": {

advisories/github-reviewed/2024/12/GHSA-rhx6-c78j-4q9w/GHSA-rhx6-c78j-4q9w.json

+12-3
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rhx6-c78j-4q9w",
4-
"modified": "2024-12-06T00:33:27Z",
4+
"modified": "2025-01-24T21:41:07Z",
55
"published": "2024-12-05T22:40:47Z",
66
"aliases": [
77
"CVE-2024-52798"
88
],
99
"summary": "Unpatched `path-to-regexp` ReDoS in 0.1.x",
1010
"details": "### Impact\n\nThe regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of `path-to-regexp`, originally reported in CVE-2024-45296\n\n### Patches\n\nUpgrade to 0.1.12.\n\n### Workarounds\n\nAvoid using two parameters within a single path segment, when the separator is not `.` (e.g. no `/:a-:b`). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.\n\n### References\n\n- https://github.com/advisories/GHSA-9wv6-86v2-598j\n- https://blakeembrey.com/posts/2024-09-web-redos/",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -50,13 +55,17 @@
5055
{
5156
"type": "PACKAGE",
5257
"url": "https://github.com/pillarjs/path-to-regexp"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://security.netapp.com/advisory/ntap-20250124-0002"
5362
}
5463
],
5564
"database_specific": {
5665
"cwe_ids": [
5766
"CWE-1333"
5867
],
59-
"severity": "MODERATE",
68+
"severity": "HIGH",
6069
"github_reviewed": true,
6170
"github_reviewed_at": "2024-12-05T22:40:47Z",
6271
"nvd_published_at": "2024-12-05T23:15:06Z"

advisories/github-reviewed/2025/01/GHSA-6729-95v3-pjc2/GHSA-6729-95v3-pjc2.json

+17-3
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6729-95v3-pjc2",
4-
"modified": "2025-01-24T20:40:15Z",
4+
"modified": "2025-01-24T21:40:43Z",
55
"published": "2025-01-24T20:40:15Z",
66
"aliases": [
77
"CVE-2025-24363"
@@ -59,16 +59,30 @@
5959
"type": "WEB",
6060
"url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-6729-95v3-pjc2"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24363"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/HL7/fhir-ig-publisher/commit/d968694b7dd041640efab5414d7077d5028569f7"
69+
},
6270
{
6371
"type": "PACKAGE",
6472
"url": "https://github.com/HL7/fhir-ig-publisher"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/HL7/fhir-ig-publisher/releases/tag/1.8.9"
6577
}
6678
],
6779
"database_specific": {
68-
"cwe_ids": [],
80+
"cwe_ids": [
81+
"CWE-200"
82+
],
6983
"severity": "MODERATE",
7084
"github_reviewed": true,
7185
"github_reviewed_at": "2025-01-24T20:40:15Z",
72-
"nvd_published_at": null
86+
"nvd_published_at": "2025-01-24T19:15:13Z"
7387
}
7488
}

advisories/github-reviewed/2025/01/GHSA-8c3x-hq82-gjcm/GHSA-8c3x-hq82-gjcm.json

+16-3
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8c3x-hq82-gjcm",
4-
"modified": "2025-01-24T18:33:29Z",
4+
"modified": "2025-01-24T21:40:45Z",
55
"published": "2025-01-24T18:33:29Z",
66
"aliases": [
77
"CVE-2024-52807"
88
],
99
"summary": "XXE vulnerability in XSLT parsing in `org.hl7.fhir.publisher`",
1010
"details": "### Impact\nXSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.publisher is being used to within a host where external clients can submit XML.\n\nA previous release provided an incomplete solution revealed by new testing. \n\n### Patches\nThis issue has been patched as of version 1.7.4\n\n### Workarounds\nNone\n\n### References\n[Previous Advisory for Incomplete solution](https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-59rq-22fm-x8q5)\n[MITRE CWE](https://cwe.mitre.org/data/definitions/611.html)\n[OWASP XML External Entity Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#transformerfactory)",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -58,9 +63,17 @@
5863
"type": "WEB",
5964
"url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-8c3x-hq82-gjcm"
6065
},
66+
{
67+
"type": "ADVISORY",
68+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52807"
69+
},
6170
{
6271
"type": "PACKAGE",
6372
"url": "https://github.com/HL7/fhir-ig-publisher"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/HL7/fhir-ig-publisher/compare/1.7.3...1.7.4"
6477
}
6578
],
6679
"database_specific": {
@@ -70,6 +83,6 @@
7083
"severity": "HIGH",
7184
"github_reviewed": true,
7285
"github_reviewed_at": "2025-01-24T18:33:29Z",
73-
"nvd_published_at": null
86+
"nvd_published_at": "2025-01-24T19:15:12Z"
7487
}
7588
}

0 commit comments

Comments
 (0)