File tree 2 files changed +78
-0
lines changed
2 files changed +78
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-7106 (spina): Cross-Site Request Forgery in Spina'
4
+ comments : false
5
+ categories :
6
+ - spina
7
+ advisory :
8
+ gem : spina
9
+ cve : 2024-7106
10
+ ghsa : wqw3-p83g-r24v
11
+ url : https://github.com/advisories/GHSA-wqw3-p83g-r24v
12
+ title : Cross-Site Request Forgery in Spina
13
+ date : 2024-07-25
14
+ description : |
15
+ A vulnerability classified as problematic was found in
16
+ Spina CMS 2.18.0.
17
+
18
+ Affected by this vulnerability is an unknown functionality
19
+ of the file /admin/media_folders.
20
+
21
+ The manipulation leads to cross-site request forgery.
22
+ The attack can be launched remotely.
23
+
24
+ The exploit has been disclosed to the public and may be used.
25
+
26
+ The associated identifier of this vulnerability is VDB-272431.
27
+
28
+ NOTE: The vendor was contacted early about this disclosure
29
+ but did not respond in any way.
30
+ cvss_v2 : 5.0
31
+ cvss_v3 : 4.3
32
+ cvss_v4 : 6.9
33
+ notes : Never patched
34
+ related :
35
+ url :
36
+ - https://nvd.nist.gov/vuln/detail/CVE-2024-7106
37
+ - https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md
38
+ - https://vuldb.com/?ctiid.272431
39
+ - https://vuldb.com/?id.272431
40
+ - https://vuldb.com/?submit.376769
41
+ - https://github.com/advisories/GHSA-wqw3-p83g-r24v
42
+ ---
Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-42360 (sequenceserver): Command Injection in sequenceserver gem'
4
+ comments : false
5
+ categories :
6
+ - sequenceserver
7
+ advisory :
8
+ gem : sequenceserver
9
+ cve : 2024-42360
10
+ ghsa : qv32-5wm2-p32h
11
+ url : https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h
12
+ title : Command Injection in sequenceserver gem
13
+ date : 2024-08-13
14
+ description : |
15
+ ### Impact
16
+
17
+ Several HTTP endpoints did not properly sanitize user input
18
+ and/or query parameters. This could be exploited to inject
19
+ and run unwanted shell commands
20
+
21
+ ### Patches
22
+
23
+ Fixed in 3.1.2
24
+
25
+ ### Workarounds
26
+
27
+ No known workarounds
28
+ cvss_v3 : 9.8
29
+ patched_versions :
30
+ - " >= 3.1.2"
31
+ related :
32
+ url :
33
+ - https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h
34
+ - https://github.com/wurmlab/sequenceserver/commit/457e52709f7f9ed2fceed59b3db564cb50785dba
35
+ - https://github.com/advisories/GHSA-qv32-5wm2-p32h
36
+ ---
You can’t perform that action at this time.
0 commit comments