Skip to content

File tree

8 files changed

+45
-9
lines changed

8 files changed

+45
-9
lines changed

advisories/github-reviewed/2024/08/GHSA-49q7-c7j4-3p7m/GHSA-49q7-c7j4-3p7m.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-49q7-c7j4-3p7m",
4-
"modified": "2024-08-15T17:52:28Z",
4+
"modified": "2025-11-04T16:52:52Z",
55
"published": "2024-08-02T09:31:35Z",
66
"aliases": [
77
"CVE-2024-42461"
@@ -58,6 +58,10 @@
5858
{
5959
"type": "PACKAGE",
6060
"url": "https://github.com/indutny/elliptic"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://security.netapp.com/advisory/ntap-20241004-0005"
6165
}
6266
],
6367
"database_specific": {

advisories/github-reviewed/2024/08/GHSA-977x-g7h5-7qgw/GHSA-977x-g7h5-7qgw.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-977x-g7h5-7qgw",
4-
"modified": "2024-08-15T17:53:05Z",
4+
"modified": "2025-11-04T16:52:43Z",
55
"published": "2024-08-02T09:31:35Z",
66
"aliases": [
77
"CVE-2024-42460"
@@ -62,6 +62,10 @@
6262
{
6363
"type": "PACKAGE",
6464
"url": "https://github.com/indutny/elliptic"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://security.netapp.com/advisory/ntap-20241004-0005"
6569
}
6670
],
6771
"database_specific": {

advisories/github-reviewed/2024/09/GHSA-9hf4-67fc-4vf4/GHSA-9hf4-67fc-4vf4.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9hf4-67fc-4vf4",
4-
"modified": "2024-09-20T22:12:43Z",
4+
"modified": "2025-11-04T16:53:06Z",
55
"published": "2024-09-20T14:40:16Z",
66
"aliases": [
77
"CVE-2024-45614"
@@ -83,6 +83,10 @@
8383
"type": "WEB",
8484
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2024-45614.yml"
8585
},
86+
{
87+
"type": "WEB",
88+
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00004.html"
89+
},
8690
{
8791
"type": "WEB",
8892
"url": "https://nginx.org/en/docs/http/ngx_http_core_module.html#underscores_in_headers"

advisories/github-reviewed/2024/11/GHSA-32p4-gm2c-wmch/GHSA-32p4-gm2c-wmch.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32p4-gm2c-wmch",
4-
"modified": "2025-02-25T21:45:58Z",
4+
"modified": "2025-11-04T16:53:27Z",
55
"published": "2024-11-06T12:31:32Z",
66
"aliases": [
77
"CVE-2024-9902"
@@ -167,6 +167,10 @@
167167
{
168168
"type": "PACKAGE",
169169
"url": "https://github.com/ansible/ansible"
170+
},
171+
{
172+
"type": "WEB",
173+
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00021.html"
170174
}
171175
],
172176
"database_specific": {

advisories/github-reviewed/2024/11/GHSA-8w49-h785-mj3c/GHSA-8w49-h785-mj3c.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8w49-h785-mj3c",
4-
"modified": "2024-11-22T22:27:52Z",
4+
"modified": "2025-11-04T16:54:32Z",
55
"published": "2024-11-22T20:26:41Z",
66
"aliases": [
77
"CVE-2024-52804"
@@ -54,6 +54,10 @@
5454
{
5555
"type": "PACKAGE",
5656
"url": "https://github.com/tornadoweb/tornado"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00000.html"
5761
}
5862
],
5963
"database_specific": {

advisories/github-reviewed/2024/11/GHSA-hfq9-hggm-c56q/GHSA-hfq9-hggm-c56q.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hfq9-hggm-c56q",
4-
"modified": "2024-11-08T13:55:23Z",
4+
"modified": "2025-11-04T16:53:40Z",
55
"published": "2024-11-07T21:51:17Z",
66
"aliases": [
77
"CVE-2024-47072"
@@ -60,6 +60,10 @@
6060
"type": "PACKAGE",
6161
"url": "https://github.com/x-stream/xstream"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00023.html"
66+
},
6367
{
6468
"type": "WEB",
6569
"url": "https://x-stream.github.io/CVE-2024-47072.html"

advisories/github-reviewed/2024/11/GHSA-xvg8-m4x3-w6xr/GHSA-xvg8-m4x3-w6xr.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xvg8-m4x3-w6xr",
4-
"modified": "2024-11-12T19:54:38Z",
4+
"modified": "2025-11-04T16:53:54Z",
55
"published": "2024-11-12T19:54:38Z",
66
"aliases": [
77
"CVE-2024-50336"
88
],
99
"summary": "matrix-js-sdk has insufficient MXC URI validation which allows client-side path traversal",
10-
"details": "### Summary\n\nmatrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver.\n\n### Details\n\nThe Matrix specification demands homeservers to [perform validation](https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5) of the `server-name` and `media-id` components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent *client-side* path traversal. matrix-js-sdk fails to perform this validation.\n\n### Patches\n\nFixed in matrix-js-sdk 34.11.1.\n\n### Workarounds\n\nNone.\n\n### References\n\n- https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5\n- https://blog.doyensec.com/2024/07/02/cspt2csrf.html\n",
10+
"details": "### Summary\n\nmatrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver.\n\n### Details\n\nThe Matrix specification demands homeservers to [perform validation](https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5) of the `server-name` and `media-id` components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent *client-side* path traversal. matrix-js-sdk fails to perform this validation.\n\n### Patches\n\nFixed in matrix-js-sdk 34.11.1.\n\n### Workarounds\n\nNone.\n\n### References\n\n- https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5\n- https://blog.doyensec.com/2024/07/02/cspt2csrf.html",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
@@ -48,6 +48,10 @@
4848
"type": "PACKAGE",
4949
"url": "https://github.com/matrix-org/matrix-js-sdk"
5050
},
51+
{
52+
"type": "WEB",
53+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00004.html"
54+
},
5155
{
5256
"type": "WEB",
5357
"url": "https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5"

advisories/github-reviewed/2024/12/GHSA-mwcw-c2x4-8c55/GHSA-mwcw-c2x4-8c55.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mwcw-c2x4-8c55",
4-
"modified": "2024-12-13T22:57:29Z",
4+
"modified": "2025-11-04T16:54:54Z",
55
"published": "2024-12-09T03:30:59Z",
66
"aliases": [
77
"CVE-2024-55565"
@@ -74,6 +74,14 @@
7474
{
7575
"type": "WEB",
7676
"url": "https://github.com/ai/nanoid/releases/tag/5.0.9"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html"
7785
}
7886
],
7987
"database_specific": {

0 commit comments

Comments
 (0)