Skip to content

Commit 8515000

Browse files

File tree

5 files changed

+35
-7
lines changed

5 files changed

+35
-7
lines changed

advisories/github-reviewed/2021/12/GHSA-fj7f-vq84-fh43/GHSA-fj7f-vq84-fh43.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fj7f-vq84-fh43",
4-
"modified": "2021-12-14T15:31:09Z",
4+
"modified": "2025-11-03T22:27:44Z",
55
"published": "2021-12-08T19:51:36Z",
66
"aliases": [
77
"CVE-2021-43809"
@@ -64,6 +64,10 @@
6464
"type": "WEB",
6565
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2021-43809.yml"
6666
},
67+
{
68+
"type": "WEB",
69+
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00015.html"
70+
},
6771
{
6872
"type": "WEB",
6973
"url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers"

advisories/github-reviewed/2022/03/GHSA-jvfv-hrrc-6q72/GHSA-jvfv-hrrc-6q72.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jvfv-hrrc-6q72",
4-
"modified": "2022-03-18T21:12:35Z",
4+
"modified": "2025-11-03T22:28:08Z",
55
"published": "2022-03-05T00:00:45Z",
66
"aliases": [
77
"CVE-2022-0839"
@@ -55,6 +55,10 @@
5555
{
5656
"type": "WEB",
5757
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "http://seclists.org/fulldisclosure/2025/Apr/14"
5862
}
5963
],
6064
"database_specific": {

advisories/github-reviewed/2022/04/GHSA-8m5h-hrqm-pxm2/GHSA-8m5h-hrqm-pxm2.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8m5h-hrqm-pxm2",
4-
"modified": "2022-04-27T21:09:43Z",
4+
"modified": "2025-11-03T22:28:22Z",
55
"published": "2022-04-27T21:09:43Z",
66
"aliases": [
77
"CVE-2022-23457"
88
],
99
"summary": "Path traversal in the OWASP Enterprise Security API",
10-
"details": "### Impact\nThe default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.\n\n### Patches\nThis vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.\n\n### Workarounds\nYes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n",
10+
"details": "### Impact\nThe default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.\n\n### Patches\nThis vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.\n\n### Workarounds\nYes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.\n\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -63,6 +63,10 @@
6363
"type": "WEB",
6464
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00010.html"
69+
},
6670
{
6771
"type": "WEB",
6872
"url": "https://security.netapp.com/advisory/ntap-20230127-0014"

advisories/github-reviewed/2022/04/GHSA-q77q-vx4q-xx6q/GHSA-q77q-vx4q-xx6q.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q77q-vx4q-xx6q",
4-
"modified": "2022-05-10T15:44:45Z",
4+
"modified": "2025-11-03T22:28:35Z",
55
"published": "2022-04-27T21:09:46Z",
66
"aliases": [
77
"CVE-2022-24891"
88
],
99
"summary": "Cross-site Scripting in org.owasp.esapi:esapi",
10-
"details": "### Impact\nThere is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for \"onsiteURL\" in the **antisamy-esapi.xml** configuration file that can cause URLs with the \"javascript:\" scheme to NOT be sanitized. See the reference below for full details.\n\n### Patches\nPatched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.\n\n### Workarounds\nManually edit your **antisamy-esapi.xml** configuration files to change the \"onsiteURL\" regular expression as per remediation instructions in the reference below.\n\n### References\n[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.\n",
10+
"details": "### Impact\nThere is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for \"onsiteURL\" in the **antisamy-esapi.xml** configuration file that can cause URLs with the \"javascript:\" scheme to NOT be sanitized. See the reference below for full details.\n\n### Patches\nPatched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.\n\n### Workarounds\nManually edit your **antisamy-esapi.xml** configuration files to change the \"onsiteURL\" regular expression as per remediation instructions in the reference below.\n\n### References\n[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under \"Leaders\".\n* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt"
6161
},
62+
{
63+
"type": "WEB",
64+
"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00010.html"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://security.netapp.com/advisory/ntap-20230127-0014"

advisories/github-reviewed/2022/05/GHSA-m2h2-264f-f486/GHSA-m2h2-264f-f486.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m2h2-264f-f486",
4-
"modified": "2022-05-04T20:12:02Z",
4+
"modified": "2025-11-03T22:29:05Z",
55
"published": "2022-05-03T00:00:44Z",
66
"aliases": [
77
"CVE-2022-25844"
@@ -41,6 +41,18 @@
4141
"type": "PACKAGE",
4242
"url": "https://github.com/angular/angular.js"
4343
},
44+
{
45+
"type": "WEB",
46+
"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html"
47+
},
48+
{
49+
"type": "WEB",
50+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LNAKCNTVBIHWAUT3FKWV5N67PQXSZOO"
55+
},
4456
{
4557
"type": "WEB",
4658
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3"

0 commit comments

Comments
 (0)