Skip to content

Commit 7eab394

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@c397acb
1 parent fa5a63e commit 7eab394

File tree

2 files changed

+78
-0
lines changed

2 files changed

+78
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-7106 (spina): Cross-Site Request Forgery in Spina'
4+
comments: false
5+
categories:
6+
- spina
7+
advisory:
8+
gem: spina
9+
cve: 2024-7106
10+
ghsa: wqw3-p83g-r24v
11+
url: https://github.com/advisories/GHSA-wqw3-p83g-r24v
12+
title: Cross-Site Request Forgery in Spina
13+
date: 2024-07-25
14+
description: |
15+
A vulnerability classified as problematic was found in
16+
Spina CMS 2.18.0.
17+
18+
Affected by this vulnerability is an unknown functionality
19+
of the file /admin/media_folders.
20+
21+
The manipulation leads to cross-site request forgery.
22+
The attack can be launched remotely.
23+
24+
The exploit has been disclosed to the public and may be used.
25+
26+
The associated identifier of this vulnerability is VDB-272431.
27+
28+
NOTE: The vendor was contacted early about this disclosure
29+
but did not respond in any way.
30+
cvss_v2: 5.0
31+
cvss_v3: 4.3
32+
cvss_v4: 6.9
33+
notes: Never patched
34+
related:
35+
url:
36+
- https://nvd.nist.gov/vuln/detail/CVE-2024-7106
37+
- https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md
38+
- https://vuldb.com/?ctiid.272431
39+
- https://vuldb.com/?id.272431
40+
- https://vuldb.com/?submit.376769
41+
- https://github.com/advisories/GHSA-wqw3-p83g-r24v
42+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-42360 (sequenceserver): Command Injection in sequenceserver gem'
4+
comments: false
5+
categories:
6+
- sequenceserver
7+
advisory:
8+
gem: sequenceserver
9+
cve: 2024-42360
10+
ghsa: qv32-5wm2-p32h
11+
url: https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h
12+
title: Command Injection in sequenceserver gem
13+
date: 2024-08-13
14+
description: |
15+
### Impact
16+
17+
Several HTTP endpoints did not properly sanitize user input
18+
and/or query parameters. This could be exploited to inject
19+
and run unwanted shell commands
20+
21+
### Patches
22+
23+
Fixed in 3.1.2
24+
25+
### Workarounds
26+
27+
No known workarounds
28+
cvss_v3: 9.8
29+
patched_versions:
30+
- ">= 3.1.2"
31+
related:
32+
url:
33+
- https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h
34+
- https://github.com/wurmlab/sequenceserver/commit/457e52709f7f9ed2fceed59b3db564cb50785dba
35+
- https://github.com/advisories/GHSA-qv32-5wm2-p32h
36+
---

0 commit comments

Comments
 (0)