Skip to content

Commit 1d88c7f

Browse files
committed
Sync with GitHub Security Advisories
* Add inline_svg/CVE-2020-36644 and oxidized-web/CVE-2019-25088 * Add metadata for existing vulnerabilities git/CVE-2022-46648, keynote/CVE-2017-20159, pghero/CVE-2023-22626
1 parent 55138bf commit 1d88c7f

File tree

5 files changed

+50
-4
lines changed

5 files changed

+50
-4
lines changed

gems/git/CVE-2022-46648.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
gem: git
33
cve: 2022-46648
4+
ghsa: pfpr-3463-c6jh
45
url: https://github.com/ruby-git/ruby-git/pull/602
56
title: Potential remote code execution in ruby-git
67
date: 2023-01-05
@@ -15,10 +16,10 @@ description: |
1516
remote code execution. Version 1.13.0 of the git gem was released which
1617
correctly parses any quoted file names.
1718
cvss_v3: 5.5
18-
patched_versions:
19-
- '>= 1.13.0'
2019
unaffected_versions:
21-
- '< 1.2.0'
20+
- "< 1.2.0"
21+
patched_versions:
22+
- ">= 1.13.0"
2223
related:
2324
url:
24-
- https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0
25+
- https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0

gems/inline_svg/CVE-2020-36644.yml

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
gem: inline_svg
3+
cve: 2020-36644
4+
ghsa: p33q-4h4m-j994
5+
url: https://github.com/jamesmartin/inline_svg/pull/117
6+
title: Inline SVG vulnerable to Cross-site Scripting
7+
date: 2023-01-07
8+
description: |
9+
A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1
10+
and classified as problematic. Affected by this vulnerability is an unknown functionality
11+
of the file `lib/inline_svg/action_view/helpers.rb` of the component `URL Parameter
12+
Handler`. The manipulation of the argument filename leads to cross site scripting.
13+
The attack can be launched remotely. Upgrading to version 1.7.2 is able to address
14+
this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It
15+
is recommended to upgrade the affected component. The identifier VDB-217597 was
16+
assigned to this vulnerability.
17+
patched_versions:
18+
- ">= 1.7.2"
19+
related:
20+
url:
21+
- https://github.com/jamesmartin/inline_svg/commit/f5363b351508486021f99e083c92068cf2943621
22+
- https://github.com/jamesmartin/inline_svg/releases/tag/v1.7.2
23+
- https://vuldb.com/?id.217597

gems/keynote/CVE-2017-20159.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ description: |
1313
this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It
1414
is recommended to upgrade the affected component. VDB-217142 is the identifier assigned
1515
to this vulnerability.
16+
cvss_v3: 6.1
1617
patched_versions:
1718
- ">= 1.0.0"
1819
related:

gems/oxidized-web/CVE-2019-25088.yml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
gem: oxidized-web
3+
cve: 2019-25088
4+
ghsa: 8qwh-rm6c-jv96
5+
url: https://github.com/ytti/oxidized-web/pull/195
6+
title: Oxidized Web vulnerable to Cross-site Scripting
7+
date: 2022-12-27
8+
description: |
9+
A vulnerability was found in ytti Oxidized Web. It has been classified
10+
as problematic. Affected is an unknown function of the file `lib/oxidized/web/views/conf_search.haml`.
11+
The manipulation of the argument `to_research` leads to cross site scripting. It
12+
is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45.
13+
It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier
14+
assigned to this vulnerability.
15+
cvss_v3: 5.4
16+
related:
17+
url:
18+
- https://github.com/ytti/oxidized-web/commit/55ab9bdc68b03ebce9280b8746ef31d7fdedcc45
19+
- https://vuldb.com/?id.216870

gems/pghero/CVE-2023-22626.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
gem: pghero
33
cve: 2023-22626
4+
ghsa: vf99-xw26-86g5
45
url: https://github.com/ankane/pghero/issues/439
56
title: Information Disclosure Through EXPLAIN Feature
67
date: 2023-01-04
@@ -10,5 +11,6 @@ description: |
1011
appear in an error message. If the PgHero database user has superuser privileges
1112
(not recommended), the user can use file access functions to read files on the
1213
database server.
14+
cvss_v3: 7.5
1315
patched_versions:
1416
- ">= 3.1.0"

0 commit comments

Comments
 (0)