Skip to content

Commit 56d950e

Browse files
jasnowpostmodern
authored andcommitted
Ran GHSA sync script and got 2 modified and 1 new
1 parent 77ae7ba commit 56d950e

File tree

3 files changed

+29
-3
lines changed

3 files changed

+29
-3
lines changed

gems/actionpack/CVE-2011-1497.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ description: |
1010
A cross-site scripting vulnerability flaw was found in
1111
the auto_link function in Rails before version 3.0.6.
1212
cvss_v2: 4.3
13+
cvss_v3: 6.1
1314
patched_versions:
1415
- ">= 3.0.6"
1516
related:

gems/camaleon_cms/CVE-2023-30145.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: camaleon_cms
3+
cve: 2023-30145
4+
ghsa: x487-866m-p8hr
5+
url: http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
6+
title: Server-Side Template Injection in Camaleon CMS
7+
date: 2023-05-26
8+
description: |
9+
Camaleon CMS prior to 2.7.4 was discovered to contain a Server-Side
10+
Template Injection (SSTI) vulnerability via the `formats` parameter.
11+
cvss_v3: 9.8
12+
patched_versions:
13+
- ">= 2.7.4"
14+
related:
15+
url:
16+
- https://nvd.nist.gov/vuln/detail/CVE-2023-30145
17+
- https://github.com/paragbagul111/CVE-2023-30145
18+
- http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
19+
- https://github.com/owen2345/camaleon-cms/issues/1052
20+
- https://github.com/owen2345/camaleon-cms/commit/4485788c544eb1aae52ca613bd9626129e3df6ee
21+
- https://github.com/owen2345/camaleon-cms/releases/tag/2.7.4
22+
- https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link
23+
- https://portswigger.net/research/server-side-template-injection
24+
- https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection
25+
- https://github.com/advisories/GHSA-x487-866m-p8hr

gems/jquery-rails/CVE-2019-11358.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,18 @@
22
gem: jquery-rails
33
framework: rails
44
cve: 2019-11358
5-
date: 2019-04-19
5+
ghsa: 6c3j-c64m-qhgq
66
url: https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
77
title: Prototype pollution attack through jQuery $.extend
8+
date: 2019-04-19
89
description: |
910
jQuery before 3.4.0 mishandles jQuery.extend(true, {}, ...) because of
1011
bject.prototype pollution. If an unsanitized source object contained an
1112
enumerable __proto__ property, it could extend the native Object.prototype.
1213
cvss_v2: 4.3
1314
cvss_v3: 6.1
1415
patched_versions:
15-
- '>= 4.3.4'
16-
16+
- ">= 4.3.4"
1717
related:
1818
url:
1919
- https://hackerone.com/reports/454365

0 commit comments

Comments
 (0)