Skip to content

Commit

Permalink
update and format
Browse files Browse the repository at this point in the history
  • Loading branch information
SemProvoost committed Dec 19, 2024
1 parent f428e25 commit a791366
Show file tree
Hide file tree
Showing 517 changed files with 16,765 additions and 11,891 deletions.
59 changes: 36 additions & 23 deletions vulnerabilities/AIKIDO-2023-10001.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,38 @@
{
"id" : "AIKIDO-2023-10001",
"package_name" : "axios",
"patch_versions" : [ "0.29.0", "1.6.4" ],
"vulnerable_ranges" : [ [ "0.1.0", "0.28.1" ], [ "1.0.0", "1.6.3" ] ],
"cwe" : [ "CWE-1321" ],
"tldr" : "Several security vulnerabilities were quietly patched in `axios` version 1.6.4 and version 0.29.0. Notably, a prototype pollution flaw impacted the `formDataToJSON` function, posing a significant risk. Additionally, a Regular Expression Denial of Service (ReDoS) vulnerability was identified and fixed in the `combineURLs` function.",
"doest_this_affect_me" : "You are affected by this flaw if you use the formDataToJSON function. This is more likely to happen in a front-end than in a backend.",
"how_to_fix" : "To fix, either freeze the prototype or upgrade to axios 1.6.4 or above.",
"reporter" : null,
"vulnerable_to" : "Prototype Pollution",
"related_cve_id" : "",
"language" : "JS",
"severity_class" : "HIGH",
"aikido_score" : 77,
"changelog" : "https://github.com/axios/axios/releases/tag/v1.6.4",
"package_name_alias" : null,
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-01",
"last_modified" : "2024-11-22"
"package_name": "axios",
"patch_versions": [
"0.29.0",
"1.6.4"
],
"vulnerable_ranges": [
[
"0.1.0",
"0.28.1"
],
[
"1.0.0",
"1.6.3"
]
],
"cwe": [
"CWE-1321"
],
"tldr": "Several security vulnerabilities were quietly patched in `axios` version 1.6.4 and version 0.29.0. Notably, a prototype pollution flaw impacted the `formDataToJSON` function, posing a significant risk. Additionally, a Regular Expression Denial of Service (ReDoS) vulnerability was identified and fixed in the `combineURLs` function.",
"doest_this_affect_me": "You are affected by this flaw if you use the formDataToJSON function. This is more likely to happen in a front-end than in a backend.",
"how_to_fix": "To fix, either freeze the prototype or upgrade to axios 1.6.4 or above.",
"reporter": null,
"vulnerable_to": "Prototype Pollution",
"related_cve_id": "",
"language": "JS",
"severity_class": "HIGH",
"aikido_score": 77,
"changelog": "https://github.com/axios/axios/releases/tag/v1.6.4",
"package_name_alias": null,
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-01",
"last_modified": "2024-11-22"
}
54 changes: 31 additions & 23 deletions vulnerabilities/AIKIDO-2024-10001.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,33 @@
{
"id" : "AIKIDO-2024-10001",
"package_name" : "lilconfig",
"patch_versions" : [ "3.1.1" ],
"vulnerable_ranges" : [ [ "3.1.0", "3.1.0" ] ],
"cwe" : [ "CWE-94" ],
"tldr" : "A code injection vulnerability was silently addressed in version 3.1.1 of `lilconfig`, impacting all uses of the package in earlier versions.",
"doest_this_affect_me" : "You are affected by this flaw if you use the 3.1.0 version of this package.",
"how_to_fix" : "To fix, upgrade to `lilconfig` 3.1.1 or above.",
"reporter" : null,
"vulnerable_to" : "Code Injection",
"related_cve_id" : "",
"language" : "JS",
"severity_class" : "MEDIUM",
"aikido_score" : 50,
"changelog" : "https://github.com/antonk52/lilconfig/releases/tag/v3.1.1",
"package_name_alias" : null,
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-23",
"last_modified" : "2024-02-23"
"package_name": "lilconfig",
"patch_versions": [
"3.1.1"
],
"vulnerable_ranges": [
[
"3.1.0",
"3.1.0"
]
],
"cwe": [
"CWE-94"
],
"tldr": "A code injection vulnerability was silently addressed in version 3.1.1 of `lilconfig`, impacting all uses of the package in earlier versions.",
"doest_this_affect_me": "You are affected by this flaw if you use the 3.1.0 version of this package.",
"how_to_fix": "To fix, upgrade to `lilconfig` 3.1.1 or above.",
"reporter": null,
"vulnerable_to": "Code Injection",
"related_cve_id": "",
"language": "JS",
"severity_class": "MEDIUM",
"aikido_score": 50,
"changelog": "https://github.com/antonk52/lilconfig/releases/tag/v3.1.1",
"package_name_alias": null,
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-23",
"last_modified": "2024-02-23"
}
54 changes: 31 additions & 23 deletions vulnerabilities/AIKIDO-2024-10002.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,33 @@
{
"id" : "AIKIDO-2024-10002",
"package_name" : "rpyc",
"patch_versions" : [ "6.0.0" ],
"vulnerable_ranges" : [ [ "4.0.0", "5.3.1" ] ],
"cwe" : [ "CWE-94" ],
"tldr" : "A Remote Code Execution (RCE) vulnerability was discreetly patched in version 6.0.0 of rpyc. This exploit is only possible when the server-side accesses the `__array__` attribute and invokes it, such as through `np.array(x)`.",
"doest_this_affect_me" : "You are affected by this flaw if you use a version >= 4.0.0 and <= 5.3.1 of this package.",
"how_to_fix" : "To fix, upgrade to `rpyc` 6.0.0 or above.",
"reporter" : null,
"vulnerable_to" : "Remote Code Execution (RCE)",
"related_cve_id" : "CVE-2024-27758",
"language" : "python",
"severity_class" : "HIGH",
"aikido_score" : 80,
"changelog" : "https://github.com/tomerfiliba-org/rpyc/releases/tag/6.0.0",
"package_name_alias" : null,
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-26",
"last_modified" : "2024-02-26"
"package_name": "rpyc",
"patch_versions": [
"6.0.0"
],
"vulnerable_ranges": [
[
"4.0.0",
"5.3.1"
]
],
"cwe": [
"CWE-94"
],
"tldr": "A Remote Code Execution (RCE) vulnerability was discreetly patched in version 6.0.0 of rpyc. This exploit is only possible when the server-side accesses the `__array__` attribute and invokes it, such as through `np.array(x)`.",
"doest_this_affect_me": "You are affected by this flaw if you use a version >= 4.0.0 and <= 5.3.1 of this package.",
"how_to_fix": "To fix, upgrade to `rpyc` 6.0.0 or above.",
"reporter": null,
"vulnerable_to": "Remote Code Execution (RCE)",
"related_cve_id": "CVE-2024-27758",
"language": "python",
"severity_class": "HIGH",
"aikido_score": 80,
"changelog": "https://github.com/tomerfiliba-org/rpyc/releases/tag/6.0.0",
"package_name_alias": null,
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-26",
"last_modified": "2024-02-26"
}
54 changes: 31 additions & 23 deletions vulnerabilities/AIKIDO-2024-10003.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,33 @@
{
"id" : "AIKIDO-2024-10003",
"package_name" : "smart-open",
"patch_versions" : [ "7.0.0" ],
"vulnerable_ranges" : [ [ "6.3.0", "6.4.0" ] ],
"cwe" : [ "CWE-300" ],
"tldr" : "The connection to the FTPS server was insufficiently secured because the FTP library, by default, does not utilize SSL certificates.",
"doest_this_affect_me" : "You are affected by this flaw if you use the FTP secure connection functionality and version 6.3.0 or 6.4.0 of this package.",
"how_to_fix" : "To fix, upgrade to `smart-open` 7.0.0 or above.",
"reporter" : null,
"vulnerable_to" : "Man-in-the-middle attack",
"related_cve_id" : "",
"language" : "python",
"severity_class" : "MEDIUM",
"aikido_score" : 45,
"changelog" : "https://github.com/piskvorky/smart_open/releases/tag/v7.0.0",
"package_name_alias" : null,
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-26",
"last_modified" : "2024-02-26"
"package_name": "smart-open",
"patch_versions": [
"7.0.0"
],
"vulnerable_ranges": [
[
"6.3.0",
"6.4.0"
]
],
"cwe": [
"CWE-300"
],
"tldr": "The connection to the FTPS server was insufficiently secured because the FTP library, by default, does not utilize SSL certificates.",
"doest_this_affect_me": "You are affected by this flaw if you use the FTP secure connection functionality and version 6.3.0 or 6.4.0 of this package.",
"how_to_fix": "To fix, upgrade to `smart-open` 7.0.0 or above.",
"reporter": null,
"vulnerable_to": "Man-in-the-middle attack",
"related_cve_id": "",
"language": "python",
"severity_class": "MEDIUM",
"aikido_score": 45,
"changelog": "https://github.com/piskvorky/smart_open/releases/tag/v7.0.0",
"package_name_alias": null,
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-26",
"last_modified": "2024-02-26"
}
54 changes: 31 additions & 23 deletions vulnerabilities/AIKIDO-2024-10004.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,33 @@
{
"id" : "AIKIDO-2024-10004",
"package_name" : "aws-cdk",
"patch_versions" : [ "2.130.0" ],
"vulnerable_ranges" : [ [ "2.109.0", "2.129.0" ] ],
"cwe" : [ "CWE-117" ],
"tldr" : "Affected versions of this package allow attackers to forge log entries or inject malicious content into log files.",
"doest_this_affect_me" : "You are affected by this flaw if you use a version >= 2.109.0 and <= 2.129.0 of this package.",
"how_to_fix" : "To fix, upgrade to `aws-cdk` 2.130.0 or above.",
"reporter" : null,
"vulnerable_to" : "Log injection",
"related_cve_id" : "",
"language" : "python",
"severity_class" : "LOW",
"aikido_score" : 20,
"changelog" : "https://github.com/aws/aws-cdk/releases/tag/v2.130.0",
"package_name_alias" : "aws-cdk-lib",
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-26",
"last_modified" : "2024-02-26"
"package_name": "aws-cdk",
"patch_versions": [
"2.130.0"
],
"vulnerable_ranges": [
[
"2.109.0",
"2.129.0"
]
],
"cwe": [
"CWE-117"
],
"tldr": "Affected versions of this package allow attackers to forge log entries or inject malicious content into log files.",
"doest_this_affect_me": "You are affected by this flaw if you use a version >= 2.109.0 and <= 2.129.0 of this package.",
"how_to_fix": "To fix, upgrade to `aws-cdk` 2.130.0 or above.",
"reporter": null,
"vulnerable_to": "Log injection",
"related_cve_id": "",
"language": "python",
"severity_class": "LOW",
"aikido_score": 20,
"changelog": "https://github.com/aws/aws-cdk/releases/tag/v2.130.0",
"package_name_alias": "aws-cdk-lib",
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-26",
"last_modified": "2024-02-26"
}
54 changes: 31 additions & 23 deletions vulnerabilities/AIKIDO-2024-10005.json
Original file line number Diff line number Diff line change
@@ -1,25 +1,33 @@
{
"id" : "AIKIDO-2024-10005",
"package_name" : "aws-cdk",
"patch_versions" : [ "2.130.0" ],
"vulnerable_ranges" : [ [ "2.109.0", "2.129.0" ] ],
"cwe" : [ "CWE-117" ],
"tldr" : "Affected versions of this package allow attackers to forge log entries or inject malicious content into log files.",
"doest_this_affect_me" : "You are affected by this flaw if you use a version >= 2.109.0 and <= 2.129.0 of this package.",
"how_to_fix" : "To fix, upgrade to `aws-cdk` 2.130.0 or above.",
"reporter" : null,
"vulnerable_to" : "Log injection",
"related_cve_id" : "",
"language" : "JS",
"severity_class" : "LOW",
"aikido_score" : 20,
"changelog" : "https://github.com/aws/aws-cdk/releases/tag/v2.130.0",
"package_name_alias" : "aws-cdk-lib",
"package_wildcard_ends_in" : null,
"package_wildcard_contains" : null,
"extra_specific_non_vulnerable_versions" : null,
"unaffected_distros" : null,
"simplify_version_if_has_patch_part" : false,
"published" : "2024-02-26",
"last_modified" : "2024-02-26"
"package_name": "aws-cdk",
"patch_versions": [
"2.130.0"
],
"vulnerable_ranges": [
[
"2.109.0",
"2.129.0"
]
],
"cwe": [
"CWE-117"
],
"tldr": "Affected versions of this package allow attackers to forge log entries or inject malicious content into log files.",
"doest_this_affect_me": "You are affected by this flaw if you use a version >= 2.109.0 and <= 2.129.0 of this package.",
"how_to_fix": "To fix, upgrade to `aws-cdk` 2.130.0 or above.",
"reporter": null,
"vulnerable_to": "Log injection",
"related_cve_id": "",
"language": "JS",
"severity_class": "LOW",
"aikido_score": 20,
"changelog": "https://github.com/aws/aws-cdk/releases/tag/v2.130.0",
"package_name_alias": "aws-cdk-lib",
"package_wildcard_ends_in": null,
"package_wildcard_contains": null,
"extra_specific_non_vulnerable_versions": null,
"unaffected_distros": null,
"simplify_version_if_has_patch_part": false,
"published": "2024-02-26",
"last_modified": "2024-02-26"
}
Loading

0 comments on commit a791366

Please sign in to comment.