Skip to content

Commit a43bfac

Browse files
1 parent a0b06b1 commit a43bfac

File tree

3 files changed

+98
-40
lines changed

3 files changed

+98
-40
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2hfj-jv6q-762v",
4+
"modified": "2025-10-13T21:01:46Z",
5+
"published": "2025-10-13T18:31:13Z",
6+
"aliases": [
7+
"CVE-2025-62244"
8+
],
9+
"summary": "Liferay Publications vulnerable to Authorization Bypass Through User-Controlled Key",
10+
"details": "Insecure direct object reference (IDOR) vulnerability in Publications in Liferay Portal 7.3.1 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 GA through update 92, and 7.3 GA through update 36 allows remote authenticated attackers to view the edit page of a publication via the `_com_liferay_change_tracking_web_portlet_PublicationsPortlet_ctCollectionId` parameter.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "com.liferay:com.liferay.change.tracking.web"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.0.122"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62244"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/liferay/liferay-portal/commit/0a7a4233881d6fa29fba12695b916d885d76349f"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/liferay/liferay-portal/commit/31cf99363bf615f4a3383ffcc78d800de3fa2465"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/liferay/liferay-portal"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-62244"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-639"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-10-13T21:01:46Z",
67+
"nvd_published_at": "2025-10-13T17:15:34Z"
68+
}
69+
}

advisories/unreviewed/2025/10/GHSA-rg9h-vx28-xxp5/GHSA-rg9h-vx28-xxp5.json renamed to advisories/github-reviewed/2025/10/GHSA-rg9h-vx28-xxp5/GHSA-rg9h-vx28-xxp5.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rg9h-vx28-xxp5",
4-
"modified": "2025-10-13T18:31:13Z",
4+
"modified": "2025-10-13T21:02:28Z",
55
"published": "2025-10-13T18:31:13Z",
66
"aliases": [
77
"CVE-2025-7707"
88
],
9+
"summary": "llama-index has Insecure Temporary File",
910
"details": "The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "llama-index"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.13.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://github.com/run-llama/llama_index/commit/98816394d57c7f53f847ed7b60725e69d0e7aae4"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/run-llama/llama_index"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://huntr.com/bounties/3fe2c8ab-6727-4aef-a0ef-4d2818e48803"
@@ -33,8 +58,8 @@
3358
"CWE-377"
3459
],
3560
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-10-13T21:02:28Z",
3863
"nvd_published_at": "2025-10-13T17:15:35Z"
3964
}
4065
}

advisories/unreviewed/2025/10/GHSA-2hfj-jv6q-762v/GHSA-2hfj-jv6q-762v.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

0 commit comments

Comments
 (0)