Skip to content

Commit 3291eca

Browse files
1 parent b5b5216 commit 3291eca

File tree

3 files changed

+284
-0
lines changed

3 files changed

+284
-0
lines changed
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5j8p-438x-rgg5",
4+
"modified": "2025-12-09T17:24:09Z",
5+
"published": "2025-12-09T17:24:09Z",
6+
"aliases": [],
7+
"summary": " SAML PHP Toolkit Vulnerability on xmlseclibs CVE-2025-66475 ",
8+
"details": "**Summary**\n\nThere is a critical vulnerability on xmlseclibs [CVE-2025-66475](https://github.com/robrichards/xmlseclibs/security/advisories/GHSA-c4cc-x928-vjw9), a dependency of php-saml\n\nUpdate to the following versions of php-saml which forces the use of patched versions of xmlseclibs:\n- [2.21.1](https://github.com/SAML-Toolkits/php-saml/releases/tag/2.21.1)\n- [3.8.1](https://github.com/SAML-Toolkits/php-saml/releases/tag/3.8.1)\n- [4.3.1](https://github.com/SAML-Toolkits/php-saml/releases/tag/4.3.1)\n\n\n**Impact**\n\nSignature Wrapping Vulnerabilities allows an attacker to impersonate a user.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Packagist",
19+
"name": "onelogin/php-saml"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "2.21.1"
30+
}
31+
]
32+
}
33+
]
34+
},
35+
{
36+
"package": {
37+
"ecosystem": "Packagist",
38+
"name": "onelogin/php-saml"
39+
},
40+
"ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "3.0.0"
46+
},
47+
{
48+
"fixed": "3.8.1"
49+
}
50+
]
51+
}
52+
]
53+
},
54+
{
55+
"package": {
56+
"ecosystem": "Packagist",
57+
"name": "onelogin/php-saml"
58+
},
59+
"ranges": [
60+
{
61+
"type": "ECOSYSTEM",
62+
"events": [
63+
{
64+
"introduced": "4.0.0"
65+
},
66+
{
67+
"fixed": "4.3.1"
68+
}
69+
]
70+
}
71+
]
72+
}
73+
],
74+
"references": [
75+
{
76+
"type": "WEB",
77+
"url": "https://github.com/SAML-Toolkits/php-saml/security/advisories/GHSA-5j8p-438x-rgg5"
78+
},
79+
{
80+
"type": "WEB",
81+
"url": "https://github.com/robrichards/xmlseclibs/security/advisories/GHSA-c4cc-x928-vjw9"
82+
},
83+
{
84+
"type": "PACKAGE",
85+
"url": "https://github.com/SAML-Toolkits/php-saml"
86+
},
87+
{
88+
"type": "WEB",
89+
"url": "https://github.com/SAML-Toolkits/php-saml/releases/tag/2.21.1"
90+
},
91+
{
92+
"type": "WEB",
93+
"url": "https://github.com/SAML-Toolkits/php-saml/releases/tag/3.8.1"
94+
},
95+
{
96+
"type": "WEB",
97+
"url": "https://github.com/SAML-Toolkits/php-saml/releases/tag/4.3.1"
98+
}
99+
],
100+
"database_specific": {
101+
"cwe_ids": [
102+
"CWE-1395"
103+
],
104+
"severity": "CRITICAL",
105+
"github_reviewed": true,
106+
"github_reviewed_at": "2025-12-09T17:24:09Z",
107+
"nvd_published_at": null
108+
}
109+
}
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6w82-v552-wjw2",
4+
"modified": "2025-12-09T17:24:21Z",
5+
"published": "2025-12-09T17:24:21Z",
6+
"aliases": [],
7+
"summary": "Shopware Storefront Reflected XSS in Storefront Login Page",
8+
"details": "### Impact\n\nBy exploiting the XSS vulnerabilities, malicious actors can perform harmful actions in the user's web browser in the session context of the affected user. Some examples of this include, but are not limited to: Obtaining user session tokens. Performing administrative actions (when an administrative user is affected). These vulnerabilities pose a high security risk. Since a sensitive cookie is not configured with the HttpOnly attribute and administrator JWTs are stored in sessionStorage, any successful XSS attack could enable the theft of session cookies and administrative tokens.\n\n### Description\n\nA request parameter from the URL of the login page is directly rendered within the Twig template of the Storefront login page without further processing or input validation. This allows direct code injection into the template via the URL parameter. An attacker can create malicious links that could be used in a phishing attack. The parameter `waitTime` lacks proper input validation.\n\nThe attack can be tested with the following URL pattern:\n\n```\n/account/login?loginError=1&waitTime=<a%20href%3D\"https%3A%2F%2Fde.wikipedia.org%2Fwiki%2FPhishing\">Here<%2Fa>\n```\n\nThe same applies to the `errorSnippet` parameter:\n\n```\n/account/login?loginError=1&errorSnippet=Reset%20your%20password%20%3Ca%20href%3D%22https%3A%2F%2Fde.wikipedia.org%2Fwiki%2FPhishing%22%3Ehere%3C%2Fa%3E.\n```",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Packagist",
19+
"name": "shopware/shopware"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "6.4.6.0"
27+
},
28+
{
29+
"fixed": "6.6.10.10"
30+
}
31+
]
32+
}
33+
]
34+
},
35+
{
36+
"package": {
37+
"ecosystem": "Packagist",
38+
"name": "shopware/storefront"
39+
},
40+
"ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "6.4.6.0"
46+
},
47+
{
48+
"fixed": "6.6.10.10"
49+
}
50+
]
51+
}
52+
]
53+
},
54+
{
55+
"package": {
56+
"ecosystem": "Packagist",
57+
"name": "shopware/shopware"
58+
},
59+
"ranges": [
60+
{
61+
"type": "ECOSYSTEM",
62+
"events": [
63+
{
64+
"introduced": "6.7.0.0"
65+
},
66+
{
67+
"fixed": "6.7.5.1"
68+
}
69+
]
70+
}
71+
]
72+
},
73+
{
74+
"package": {
75+
"ecosystem": "Packagist",
76+
"name": "shopware/storefront"
77+
},
78+
"ranges": [
79+
{
80+
"type": "ECOSYSTEM",
81+
"events": [
82+
{
83+
"introduced": "6.7.0.0"
84+
},
85+
{
86+
"fixed": "6.7.5.1"
87+
}
88+
]
89+
}
90+
]
91+
}
92+
],
93+
"references": [
94+
{
95+
"type": "WEB",
96+
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-6w82-v552-wjw2"
97+
},
98+
{
99+
"type": "WEB",
100+
"url": "https://github.com/shopware/shopware/commit/c9242c02c84595d9fa3e2adf6a264bc90a657b58"
101+
},
102+
{
103+
"type": "PACKAGE",
104+
"url": "https://github.com/shopware/shopware"
105+
}
106+
],
107+
"database_specific": {
108+
"cwe_ids": [
109+
"CWE-79"
110+
],
111+
"severity": "HIGH",
112+
"github_reviewed": true,
113+
"github_reviewed_at": "2025-12-09T17:24:21Z",
114+
"nvd_published_at": null
115+
}
116+
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-93fv-4pm9-xp28",
4+
"modified": "2025-12-09T17:23:54Z",
5+
"published": "2025-12-09T17:23:54Z",
6+
"aliases": [],
7+
"summary": "JDA (Java Discord API) downloads external URLs when updating message components",
8+
"details": "### Impact\n\nAnyone using untrusted message components may be affected. On versions >=6.0.0,<6.1.3 of JDA, the requester will attempt to download external media URLs from components if they are used in an update or send request.\n\nIf you are used `Message#getComponents` or similar to get a list of components and then send those components with `sendMessageComponents` or other methods, you might unintentionally download media from an external URL in the resolved media of a `Thumbnail`, `FileDisplay`, or `MediaGallery`.\n\n### Patches\n\nThis bug has been fixed in 6.1.3, and we recommend updating.\n\n### Workarounds\n\nAvoid sending components from untrusted messages or update to version 6.1.3.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Maven",
19+
"name": "net.dv8tion:JDA"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "6.0.0"
27+
},
28+
{
29+
"fixed": "6.1.3"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/discord-jda/JDA/security/advisories/GHSA-93fv-4pm9-xp28"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/discord-jda/JDA/commit/bb6d2ce5cf514429327c257f5c6fa95a137e3ab6"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/discord-jda/JDA"
48+
}
49+
],
50+
"database_specific": {
51+
"cwe_ids": [
52+
"CWE-918"
53+
],
54+
"severity": "MODERATE",
55+
"github_reviewed": true,
56+
"github_reviewed_at": "2025-12-09T17:23:54Z",
57+
"nvd_published_at": null
58+
}
59+
}

0 commit comments

Comments
 (0)