Skip to content

Commit 15fd39a

Browse files
1 parent ebbddae commit 15fd39a

File tree

3 files changed

+133
-41
lines changed

3 files changed

+133
-41
lines changed
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gphj-4h6p-37xq",
4+
"modified": "2025-12-19T21:07:24Z",
5+
"published": "2025-12-19T00:31:42Z",
6+
"aliases": [
7+
"CVE-2025-68390"
8+
],
9+
"summary": "Elasticsearch privileged authenticated users can cause DoS through Excessive Resource Allocation ",
10+
"details": "Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.elasticsearch.plugin:x-pack-core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "8.19.8"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "org.elasticsearch.plugin:x-pack-core"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "9.0.0"
48+
},
49+
{
50+
"fixed": "9.1.8"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Maven",
59+
"name": "org.elasticsearch.plugin:x-pack-core"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "9.2.0"
67+
},
68+
{
69+
"fixed": "9.2.2"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68390"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/elastic/elasticsearch/pull/138132"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://discuss.elastic.co/t/elasticsearch-8-19-8-9-1-8-and-9-2-2-security-update-esa-2025-37/384185"
88+
},
89+
{
90+
"type": "PACKAGE",
91+
"url": "https://github.com/elastic/elasticsearch"
92+
}
93+
],
94+
"database_specific": {
95+
"cwe_ids": [
96+
"CWE-770"
97+
],
98+
"severity": "MODERATE",
99+
"github_reviewed": true,
100+
"github_reviewed_at": "2025-12-19T21:07:24Z",
101+
"nvd_published_at": "2025-12-18T23:15:49Z"
102+
}
103+
}

advisories/unreviewed/2025/12/GHSA-hp6r-r9vc-q8wx/GHSA-hp6r-r9vc-q8wx.json renamed to advisories/github-reviewed/2025/12/GHSA-hp6r-r9vc-q8wx/GHSA-hp6r-r9vc-q8wx.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hp6r-r9vc-q8wx",
4-
"modified": "2025-12-19T06:30:27Z",
4+
"modified": "2025-12-19T21:08:32Z",
55
"published": "2025-12-19T06:30:27Z",
66
"aliases": [
77
"CVE-2025-14546"
88
],
9+
"summary": "FastAPI SSP is vulnerable to Cross-site Request Forgery (CSRF) through improper OAuth parameter validation",
910
"details": "Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "fastapi-sso"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "0.19.0"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -31,6 +52,10 @@
3152
"type": "WEB",
3253
"url": "https://github.com/tomasvotava/fastapi-sso/commit/6117d1a5ad498ba57d671e8a059ebe20db5abe02"
3354
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/tomasvotava/fastapi-sso"
58+
},
3459
{
3560
"type": "WEB",
3661
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-FASTAPISSO-14386403"
@@ -41,8 +66,8 @@
4166
"CWE-285"
4267
],
4368
"severity": "MODERATE",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2025-12-19T21:08:32Z",
4671
"nvd_published_at": "2025-12-19T05:16:09Z"
4772
}
4873
}

advisories/unreviewed/2025/12/GHSA-gphj-4h6p-37xq/GHSA-gphj-4h6p-37xq.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

0 commit comments

Comments
 (0)