Skip to content

Commit 8d5d2fe

Browse files
1 parent cf7a304 commit 8d5d2fe

File tree

3 files changed

+176
-31
lines changed

3 files changed

+176
-31
lines changed
Lines changed: 112 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,112 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rhff-65hp-55rw",
4+
"modified": "2025-11-06T23:48:04Z",
5+
"published": "2022-05-24T19:12:47Z",
6+
"aliases": [
7+
"CVE-2021-36030"
8+
],
9+
"summary": "Magento allows attackers to alter the price of items",
10+
"details": "Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability during the checkout process. An unauthenticated attacker can leverage this vulnerability to alter the price of items.",
11+
"severity": [],
12+
"affected": [
13+
{
14+
"package": {
15+
"ecosystem": "Packagist",
16+
"name": "magento/project-community-edition"
17+
},
18+
"ranges": [
19+
{
20+
"type": "ECOSYSTEM",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"last_affected": "2.0.2"
27+
}
28+
]
29+
}
30+
]
31+
},
32+
{
33+
"package": {
34+
"ecosystem": "Packagist",
35+
"name": "magento/community-edition"
36+
},
37+
"ranges": [
38+
{
39+
"type": "ECOSYSTEM",
40+
"events": [
41+
{
42+
"introduced": "0"
43+
},
44+
{
45+
"fixed": "2.3.7-p1"
46+
}
47+
]
48+
}
49+
]
50+
},
51+
{
52+
"package": {
53+
"ecosystem": "Packagist",
54+
"name": "magento/community-edition"
55+
},
56+
"versions": [
57+
"2.3.7"
58+
]
59+
},
60+
{
61+
"package": {
62+
"ecosystem": "Packagist",
63+
"name": "magento/community-edition"
64+
},
65+
"ranges": [
66+
{
67+
"type": "ECOSYSTEM",
68+
"events": [
69+
{
70+
"introduced": "2.4.2-p1"
71+
},
72+
{
73+
"fixed": "2.4.2-p2"
74+
}
75+
]
76+
}
77+
]
78+
},
79+
{
80+
"package": {
81+
"ecosystem": "Packagist",
82+
"name": "magento/community-edition"
83+
},
84+
"versions": [
85+
"2.4.2"
86+
]
87+
}
88+
],
89+
"references": [
90+
{
91+
"type": "ADVISORY",
92+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36030"
93+
},
94+
{
95+
"type": "PACKAGE",
96+
"url": "https://github.com/magento/magento2"
97+
},
98+
{
99+
"type": "WEB",
100+
"url": "https://helpx.adobe.com/security/products/magento/apsb21-64.html"
101+
}
102+
],
103+
"database_specific": {
104+
"cwe_ids": [
105+
"CWE-20"
106+
],
107+
"severity": "HIGH",
108+
"github_reviewed": true,
109+
"github_reviewed_at": "2025-11-06T23:48:04Z",
110+
"nvd_published_at": "2021-09-01T15:15:00Z"
111+
}
112+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fv2r-r8mp-pg48",
4+
"modified": "2025-11-06T23:48:12Z",
5+
"published": "2025-11-06T23:48:12Z",
6+
"aliases": [
7+
"CVE-2025-64494"
8+
],
9+
"summary": "Soft Serve does not sanitize ANSI escape sequences in user input",
10+
"details": "### Impact\nIn several places where the user can insert data (e.g. names), ANSI escape sequences are not being removed, which can then be used, for example, to show fake alerts.\n\nIn the same token, git messages, when printed, are also not being sanitized.\n\nPlaces in which this was found:\n\n1. Repository Description (pkg/backend/repo.go - SetDescription)\n2. Repository Project Name (pkg/backend/repo.go - SetProjectName)\n3. Git Commit Author Names (pkg/ssh/cmd/commit.go:69)\n4. Git Commit Messages (pkg/ssh/cmd/commit.go:71)\n5. Access Token Names (pkg/ssh/cmd/token.go:107)\n6. Webhook URLs (pkg/ssh/cmd/webhooks.go:72)\n\n### Patches\nv0.11.0\n\n### Workarounds\nNo.\n\n### References\nn/a",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/charmbracelet/soft-serve"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.11.0"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 0.10.0"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-fv2r-r8mp-pg48"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/charmbracelet/soft-serve/commit/d9639320b8d0ccd76fe6836a042c042b0ebde549"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/charmbracelet/soft-serve"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-150"
58+
],
59+
"severity": "MODERATE",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-11-06T23:48:12Z",
62+
"nvd_published_at": null
63+
}
64+
}

advisories/unreviewed/2022/05/GHSA-rhff-65hp-55rw/GHSA-rhff-65hp-55rw.json

Lines changed: 0 additions & 31 deletions
This file was deleted.

0 commit comments

Comments
 (0)