All the vulnerabilites related to redhat - pagure
cve-2016-1000007
Vulnerability from cvelistv5
Published
2016-10-07 18:00
Modified
2024-08-06 03:47
Severity ?
EPSS score ?
Summary
Pagure 2.2.1 XSS in raw file endpoint
References
▼ | URL | Tags |
---|---|---|
https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Pagure 2.2.1 XSS in raw file endpoint" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-07T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1000007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pagure 2.2.1 XSS in raw file endpoint" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch", "refsource": "MISC", "url": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000007", "datePublished": "2016-10-07T18:00:00", "dateReserved": "2016-07-05T00:00:00", "dateUpdated": "2024-08-06T03:47:34.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-1002151
Vulnerability from cvelistv5
Published
2017-09-14 13:00
Modified
2024-09-17 02:36
Severity ?
EPSS score ?
Summary
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization
References
▼ | URL | Tags |
---|---|---|
https://pagure.io/pagure/pull-request/2426 | x_refsource_MISC | |
https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Pagure Project | Pagure |
Version: unspecified < 3.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:08:11.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/pull-request/2426" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Pagure", "vendor": "Pagure Project", "versions": [ { "lessThan": "3.3.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2017-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-14T13:00:00Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/pull-request/2426" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "patrick@puiterwijk.org", "DATE_ASSIGNED": "2017-07-22T15:12Z", "ID": "CVE-2017-1002151", "REQUESTER": "pingou@pingoured.fr", "STATE": "PUBLIC", "UPDATED": "2017-08-10T14:41Z" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Pagure", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.3.0" } ] } } ] }, "vendor_name": "Pagure Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/pagure/pull-request/2426", "refsource": "MISC", "url": "https://pagure.io/pagure/pull-request/2426" }, { "name": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch", "refsource": "MISC", "url": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch" } ] } } } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2017-1002151", "datePublished": "2017-09-14T13:00:00Z", "dateReserved": "2017-09-14T00:00:00Z", "dateUpdated": "2024-09-17T02:36:30.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1000037
Vulnerability from cvelistv5
Published
2019-11-06 18:27
Modified
2024-08-06 03:47
Severity ?
EPSS score ?
Summary
Pagure: XSS possible in file attachment endpoint
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:47:34.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000037" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Pagure: XSS possible in file attachment endpoint" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T18:27:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000037" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1000037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pagure: XSS possible in file attachment endpoint" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json", "refsource": "MISC", "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-1000037", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000037" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1000037", "datePublished": "2019-11-06T18:27:55", "dateReserved": "2016-10-24T00:00:00", "dateUpdated": "2024-08-06T03:47:34.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11556
Vulnerability from cvelistv5
Published
2020-09-25 05:56
Modified
2024-08-04 22:55
Severity ?
EPSS score ?
Summary
Pagure before 5.6 allows XSS via the templates/blame.html blame view.
References
▼ | URL | Tags |
---|---|---|
https://pagure.io/pagure/commits/master | x_refsource_MISC | |
https://docs.pagure.org/pagure/changelog.html | x_refsource_CONFIRM | |
https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:40.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.pagure.org/pagure/changelog.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618" }, { "name": "openSUSE-SU-2020:1765", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" }, { "name": "openSUSE-SU-2020:1810", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Pagure before 5.6 allows XSS via the templates/blame.html blame view." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-01T21:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.pagure.org/pagure/changelog.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618" }, { "name": "openSUSE-SU-2020:1765", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" }, { "name": "openSUSE-SU-2020:1810", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pagure before 5.6 allows XSS via the templates/blame.html blame view." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/pagure/commits/master", "refsource": "MISC", "url": "https://pagure.io/pagure/commits/master" }, { "name": "https://docs.pagure.org/pagure/changelog.html", "refsource": "CONFIRM", "url": "https://docs.pagure.org/pagure/changelog.html" }, { "name": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618", "refsource": "CONFIRM", "url": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618" }, { "name": "openSUSE-SU-2020:1765", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" }, { "name": "openSUSE-SU-2020:1810", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11556", "datePublished": "2020-09-25T05:56:42", "dateReserved": "2019-04-26T00:00:00", "dateUpdated": "2024-08-04T22:55:40.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7628
Vulnerability from cvelistv5
Published
2019-02-08 03:00
Modified
2024-08-04 20:54
Severity ?
EPSS score ?
Summary
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)
References
▼ | URL | Tags |
---|---|---|
https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a | x_refsource_MISC | |
https://pagure.io/pagure/pull-request/4254 | x_refsource_MISC | |
https://pagure.io/pagure/issue/4230 | x_refsource_MISC | |
https://pagure.io/pagure/issue/4252 | x_refsource_MISC | |
https://pagure.io/pagure/issue/4253 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:54:27.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/pull-request/4254" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/issue/4230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/issue/4252" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pagure.io/pagure/issue/4253" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-08T03:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/pull-request/4254" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/issue/4230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/issue/4252" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pagure.io/pagure/issue/4253" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a", "refsource": "MISC", "url": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a" }, { "name": "https://pagure.io/pagure/pull-request/4254", "refsource": "MISC", "url": "https://pagure.io/pagure/pull-request/4254" }, { "name": "https://pagure.io/pagure/issue/4230", "refsource": "MISC", "url": "https://pagure.io/pagure/issue/4230" }, { "name": "https://pagure.io/pagure/issue/4252", "refsource": "MISC", "url": "https://pagure.io/pagure/issue/4252" }, { "name": "https://pagure.io/pagure/issue/4253", "refsource": "MISC", "url": "https://pagure.io/pagure/issue/4253" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-7628", "datePublished": "2019-02-08T03:00:00", "dateReserved": "2019-02-07T00:00:00", "dateUpdated": "2024-08-04T20:54:27.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-02-08 03:29
Modified
2024-11-21 04:48
Severity ?
Summary
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://pagure.io/pagure/issue/4230 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://pagure.io/pagure/issue/4252 | Broken Link | |
cve@mitre.org | https://pagure.io/pagure/issue/4253 | Broken Link | |
cve@mitre.org | https://pagure.io/pagure/pull-request/4254 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/pagure/issue/4230 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/pagure/issue/4252 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/pagure/issue/4253 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/pagure/pull-request/4254 | Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:pagure:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD4F1B26-C35A-402F-AB2A-5368F7EA98B4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)" }, { "lang": "es", "value": "Pagure 5.2 filtra las claves API envi\u00e1ndoselas a los usuarios por correo electr\u00f3nico. Pocos servidores de correo electr\u00f3nico validan certificados TLS, por lo que es f\u00e1cil para un atacante Man-in-the-Middle (MitM) leer dichos correos y obtener acceso a Pagure en nombre de otros usuarios. Este problema se encuentra en el cron job del recordatorio de expiraci\u00f3n del token de la API en files/api_key_expire_mail.py; deshabilitar dicho job es tambi\u00e9n una posible soluci\u00f3n. (Se intent\u00f3 enviar una subcadena de la clave API, pero no fue una soluci\u00f3n v\u00e1lida)." } ], "id": "CVE-2019-7628", "lastModified": "2024-11-21T04:48:25.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-08T03:29:00.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/issue/4230" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://pagure.io/pagure/issue/4252" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://pagure.io/pagure/issue/4253" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/pull-request/4254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/issue/4230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://pagure.io/pagure/issue/4252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://pagure.io/pagure/issue/4253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/pull-request/4254" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-14 13:29
Modified
2024-11-21 03:04
Severity ?
Summary
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:pagure:*:*:*:*:*:*:*:*", "matchCriteriaId": "451A4627-89C9-4A67-A58C-63A7E0E4C168", "versionEndIncluding": "3.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization" }, { "lang": "es", "value": "Pagure, en su versi\u00f3n 3.3.0 y anteriores, es vulnerable a una p\u00e9rdida de confidencialidad debida a una autorizaci\u00f3n incorrecta." } ], "id": "CVE-2017-1002151", "lastModified": "2024-11-21T03:04:58.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-14T13:29:01.467", "references": [ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch" }, { "source": "patrick@puiterwijk.org", "tags": [ "Vendor Advisory" ], "url": "https://pagure.io/pagure/pull-request/2426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/c92108097e8ae4702c115ae4702b63d960838e75.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pagure.io/pagure/pull-request/2426" } ], "sourceIdentifier": "patrick@puiterwijk.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "patrick@puiterwijk.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-06 19:15
Modified
2024-11-21 02:42
Severity ?
Summary
Pagure: XSS possible in file attachment endpoint
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | pagure | * | |
fedoraproject | fedora | 24 | |
redhat | enterprise_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:pagure:*:*:*:*:*:*:*:*", "matchCriteriaId": "07422D68-C559-48FC-8C72-BBE9118EA1A3", "versionEndExcluding": "2.3.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pagure: XSS possible in file attachment endpoint" }, { "lang": "es", "value": "Pagure: posible vulnerabilidad de tipo XSS en el endpoint de archivo adjunto" } ], "id": "CVE-2016-1000037", "lastModified": "2024-11-21T02:42:51.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-06T19:15:11.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1000037" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-07 18:59
Modified
2024-11-21 02:42
Severity ?
Summary
Pagure 2.2.1 XSS in raw file endpoint
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:pagure:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DADA0-5F19-4046-B580-3228C62A5B68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pagure 2.2.1 XSS in raw file endpoint" }, { "lang": "es", "value": "Vulnerabilidad de XSS en Pagure 2.2.1 en el punto final de un archivo raw." } ], "id": "CVE-2016-1000007", "lastModified": "2024-11-21T02:42:50.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-07T18:59:02.350", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://pagure.io/pagure/c/070d63983fe5daef92005ea33d3b8c693c224c77.patch" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-25 06:15
Modified
2024-11-21 04:21
Severity ?
Summary
Pagure before 5.6 allows XSS via the templates/blame.html blame view.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:pagure:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDA154A5-D15D-4341-9EAB-6D1AEDB020CB", "versionEndExcluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pagure before 5.6 allows XSS via the templates/blame.html blame view." }, { "lang": "es", "value": "Pagure versiones anteriores a 5.6, permite ataques de tipo XSS por medio de la vista dblame en el archivo templates/blame.html" } ], "id": "CVE-2019-11556", "lastModified": "2024-11-21T04:21:20.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-25T06:15:13.440", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.pagure.org/pagure/changelog.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.pagure.org/pagure/changelog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/c/31a0d2950ed409550074ca52ba492f9b87ec3318?branch=ab39e95ed4dc8367e5e146e6d9a9fa6925b75618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pagure.io/pagure/commits/master" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }