1610 lines
		
	
	
		
			61 KiB
		
	
	
	
		
			JSON
		
	
	
	
	
	
			
		
		
	
	
			1610 lines
		
	
	
		
			61 KiB
		
	
	
	
		
			JSON
		
	
	
	
	
	
[
 | 
						||
  {
 | 
						||
    "advisoryKey": "GHSA-77vh-xpmg-72qh",
 | 
						||
    "affectedPackages": [
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:golang/github.com/opencontainers/image-spec",
 | 
						||
        "platform": "Go",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "1.0.2",
 | 
						||
            "introducedVersion": "0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "1.0.2",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:golang/github.com/opencontainers/image-spec",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "1.0.2",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Go:GHSA-77vh-xpmg-72qh:pkg:golang/github.com/opencontainers/image-spec"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:golang/github.com/opencontainers/image-spec",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "aliases": [
 | 
						||
      "CGA-j36r-723f-8c29",
 | 
						||
      "GHSA-77vh-xpmg-72qh"
 | 
						||
    ],
 | 
						||
    "canonicalMetricId": "3.1|CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
 | 
						||
    "credits": [],
 | 
						||
    "cvssMetrics": [
 | 
						||
      {
 | 
						||
        "baseScore": 3,
 | 
						||
        "baseSeverity": "low",
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "cvss",
 | 
						||
          "value": "CVSS_V3",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": []
 | 
						||
        },
 | 
						||
        "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
 | 
						||
        "version": "3.1"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "cwes": [
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-843",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/843.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-843",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "description": "### Impact\nIn the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index.\n\n### Patches\nThe Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document.\nRelease [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates.\n\n### Workarounds\nSoftware attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields.\n\n### References\nhttps://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in https://github.com/opencontainers/image-spec\n* Email us at [security@opencontainers.org](mailto:security@opencontainers.org)\n* https://github.com/opencontainers/image-spec/commits/v1.0.2",
 | 
						||
    "exploitKnown": false,
 | 
						||
    "language": "en",
 | 
						||
    "modified": "2021-11-24T19:43:35+00:00",
 | 
						||
    "provenance": [
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "document",
 | 
						||
        "value": "https://osv.dev/vulnerability/GHSA-77vh-xpmg-72qh",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2021-11-18T16:02:41+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "mapping",
 | 
						||
        "value": "GHSA-77vh-xpmg-72qh",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "published": "2021-11-18T16:02:41+00:00",
 | 
						||
    "references": [
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/opencontainers/image-spec",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "PACKAGE",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/opencontainers/image-spec"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/opencontainers/image-spec/releases/tag/v1.0.2",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/opencontainers/image-spec/releases/tag/v1.0.2"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9970795+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "severity": "low",
 | 
						||
    "summary": "### Impact In the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index. ### Patches The Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document. Release [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates. ### Workarounds Software attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields. ### References https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/opencontainers/image-spec * Email us at [security@opencontainers.org](mailto:security@opencontainers.org) * https://github.com/opencontainers/image-spec/commits/v1.0.2",
 | 
						||
    "title": "Clarify `mediaType` handling"
 | 
						||
  },
 | 
						||
  {
 | 
						||
    "advisoryKey": "GHSA-7rjr-3q55-vv33",
 | 
						||
    "affectedPackages": [
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "2.16.0",
 | 
						||
            "introducedVersion": "2.13.0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "2.16.0",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "2.13.0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "2.13.0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "2.16.0",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.apache.logging.log4j/log4j-core"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "2.12.2",
 | 
						||
            "introducedVersion": "0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "2.12.2",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "2.12.2",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.apache.logging.log4j/log4j-core"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.apache.logging.log4j/log4j-core",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "1.9.2",
 | 
						||
            "introducedVersion": "1.8.0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "1.9.2",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "1.8.0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "1.8.0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "1.9.2",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "1.10.8",
 | 
						||
            "introducedVersion": "1.10.0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "1.10.8",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "1.10.0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "1.10.0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "1.10.8",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "1.11.11",
 | 
						||
            "introducedVersion": "1.11.0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "1.11.11",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "1.11.0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "1.11.0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "1.11.11",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
        "platform": "Maven",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "2.0.12",
 | 
						||
            "introducedVersion": "2.0.0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "2.0.12",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "2.0.0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "2.0.0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "2.0.12",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:Maven:GHSA-7rjr-3q55-vv33:pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "aliases": [
 | 
						||
      "CVE-2021-45046",
 | 
						||
      "GHSA-7rjr-3q55-vv33"
 | 
						||
    ],
 | 
						||
    "canonicalMetricId": "3.1|CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
 | 
						||
    "credits": [],
 | 
						||
    "cvssMetrics": [
 | 
						||
      {
 | 
						||
        "baseScore": 9,
 | 
						||
        "baseSeverity": "critical",
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "cvss",
 | 
						||
          "value": "CVSS_V3",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": []
 | 
						||
        },
 | 
						||
        "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
 | 
						||
        "version": "3.1"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "cwes": [
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-502",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/502.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-502",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-917",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/917.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-917",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "description": "# Impact\n\nThe fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. \n\n## Affected packages\nOnly the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.\n\n# Mitigation\n\nLog4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).\n\nLog4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.",
 | 
						||
    "exploitKnown": false,
 | 
						||
    "language": "en",
 | 
						||
    "modified": "2025-05-09T13:13:16.169374+00:00",
 | 
						||
    "provenance": [
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "document",
 | 
						||
        "value": "https://osv.dev/vulnerability/GHSA-7rjr-3q55-vv33",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2021-12-14T18:01:28+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "mapping",
 | 
						||
        "value": "GHSA-7rjr-3q55-vv33",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "published": "2021-12-14T18:01:28+00:00",
 | 
						||
    "references": [
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "http://www.openwall.com/lists/oss-security/2021/12/14/4",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "http://www.openwall.com/lists/oss-security/2021/12/14/4"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "http://www.openwall.com/lists/oss-security/2021/12/15/3",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "http://www.openwall.com/lists/oss-security/2021/12/15/3"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "http://www.openwall.com/lists/oss-security/2021/12/18/1",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "http://www.openwall.com/lists/oss-security/2021/12/18/1"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": "advisory",
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "ADVISORY",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://logging.apache.org/log4j/2.x/security.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://logging.apache.org/log4j/2.x/security.html"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": "advisory",
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "ADVISORY",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://security.gentoo.org/glsa/202310-16",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://security.gentoo.org/glsa/202310-16"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.cve.org/CVERecord?id=CVE-2021-44228",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.debian.org/security/2021/dsa-5022",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.debian.org/security/2021/dsa-5022"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.kb.cert.org/vuls/id/930724",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.kb.cert.org/vuls/id/930724"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.openwall.com/lists/oss-security/2021/12/14/4",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.openwall.com/lists/oss-security/2021/12/14/4"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.oracle.com/security-alerts/cpuapr2022.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.oracle.com/security-alerts/cpujan2022.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://www.oracle.com/security-alerts/cpujul2022.html",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9980643+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "severity": "critical",
 | 
						||
    "summary": "# Impact The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Mitigation Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.",
 | 
						||
    "title": "Incomplete fix for Apache Log4j vulnerability"
 | 
						||
  },
 | 
						||
  {
 | 
						||
    "advisoryKey": "GHSA-cjjf-27cc-pvmv",
 | 
						||
    "affectedPackages": [
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:pypi/pyload-ng",
 | 
						||
        "platform": "PyPI",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "0.5.0b3.dev91",
 | 
						||
            "introducedVersion": "0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "0.5.0b3.dev91",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:pypi/pyload-ng",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "0.5.0b3.dev91",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:PyPI:GHSA-cjjf-27cc-pvmv:pkg:pypi/pyload-ng"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:pypi/pyload-ng",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "aliases": [
 | 
						||
      "CVE-2025-61773",
 | 
						||
      "GHSA-cjjf-27cc-pvmv"
 | 
						||
    ],
 | 
						||
    "canonicalMetricId": "3.1|CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
 | 
						||
    "credits": [],
 | 
						||
    "cvssMetrics": [
 | 
						||
      {
 | 
						||
        "baseScore": 8.1,
 | 
						||
        "baseSeverity": "high",
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "cvss",
 | 
						||
          "value": "CVSS_V3",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
          "fieldMask": []
 | 
						||
        },
 | 
						||
        "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
 | 
						||
        "version": "3.1"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "cwes": [
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-116",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/116.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-116",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-74",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/74.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-74",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-79",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/79.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-79",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-94",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/94.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-94",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "description": "### Summary\npyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input to be processed unsafely, which could be exploited by an attacker to inject arbitrary content into the web UI or manipulate request handling. The vulnerability could lead to client-side code execution (XSS) or other unintended behaviors when a malicious payload is submitted.\n\nuser-supplied parameters from HTTP requests were not adequately validated or sanitized before being passed into the application logic and response generation. This allowed crafted input to alter the expected execution flow.\n CNL (Click'N'Load) blueprint exposed unsafe handling of untrusted parameters in HTTP requests. The application did not consistently enforce input validation or encoding, making it possible for an attacker to craft malicious requests.\n\n### PoC\n\n1. Run a vulnerable version of pyLoad prior to commit [`f9d27f2`](https://github.com/pyload/pyload/pull/4624).\n2. Start the web UI and access the Captcha or CNL endpoints.\n3. Submit a crafted request containing malicious JavaScript payloads in unvalidated parameters (`/flash/addcrypted2?jk=function(){alert(1)}&crypted=12345`).\n4. Observe that the payload is reflected and executed in the client’s browser, demonstrating cross-site scripting (XSS).\n\nExample request:\n\n```http\nGET /flash/addcrypted2?jk=function(){alert(1)}&crypted=12345 HTTP/1.1\nHost: 127.0.0.1:8000\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 107\n```\n\n### Impact\n\nExploiting this vulnerability allows an attacker to inject and execute arbitrary JavaScript within the browser session of a user accessing the pyLoad Web UI. In practice, this means an attacker could impersonate an administrator, steal authentication cookies or tokens, and perform unauthorized actions on behalf of the victim. Because the affected endpoints are part of the core interface, a successful attack undermines the trust and security of the entire application, potentially leading to a full compromise of the management interface and the data it controls. The impact is particularly severe in cases where the Web UI is exposed over a network without additional access restrictions, as it enables remote attackers to directly target users with crafted links or requests that trigger the vulnerability.",
 | 
						||
    "exploitKnown": false,
 | 
						||
    "language": "en",
 | 
						||
    "modified": "2025-10-09T15:59:13.250015+00:00",
 | 
						||
    "provenance": [
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "document",
 | 
						||
        "value": "https://osv.dev/vulnerability/GHSA-cjjf-27cc-pvmv",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-09T15:19:48+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "mapping",
 | 
						||
        "value": "GHSA-cjjf-27cc-pvmv",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "published": "2025-10-09T15:19:48+00:00",
 | 
						||
    "references": [
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/pyload/pyload",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "PACKAGE",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/pyload/pyload"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/pyload/pyload/commit/5823327d0b797161c7195a1f660266d30a69f0ca",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/pyload/pyload/commit/5823327d0b797161c7195a1f660266d30a69f0ca"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/pyload/pyload/pull/4624",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/pyload/pyload/pull/4624"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/pyload/pyload/security/advisories/GHSA-cjjf-27cc-pvmv",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.995174+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/pyload/pyload/security/advisories/GHSA-cjjf-27cc-pvmv"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "severity": "high",
 | 
						||
    "summary": "### Summary pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input to be processed unsafely, which could be exploited by an attacker to inject arbitrary content into the web UI or manipulate request handling. The vulnerability could lead to client-side code execution (XSS) or other unintended behaviors when a malicious payload is submitted. user-supplied parameters from HTTP requests were not adequately validated or sanitized before being passed into the application logic and response generation. This allowed crafted input to alter the expected execution flow. CNL (Click'N'Load) blueprint exposed unsafe handling of untrusted parameters in HTTP requests. The application did not consistently enforce input validation or encoding, making it possible for an attacker to craft malicious requests. ### PoC 1. Run a vulnerable version of pyLoad prior to commit [`f9d27f2`](https://github.com/pyload/pyload/pull/4624). 2. Start the web UI and access the Captcha or CNL endpoints. 3. Submit a crafted request containing malicious JavaScript payloads in unvalidated parameters (`/flash/addcrypted2?jk=function(){alert(1)}&crypted=12345`). 4. Observe that the payload is reflected and executed in the client’s browser, demonstrating cross-site scripting (XSS). Example request: ```http GET /flash/addcrypted2?jk=function(){alert(1)}&crypted=12345 HTTP/1.1 Host: 127.0.0.1:8000 Content-Type: application/x-www-form-urlencoded Content-Length: 107 ``` ### Impact Exploiting this vulnerability allows an attacker to inject and execute arbitrary JavaScript within the browser session of a user accessing the pyLoad Web UI. In practice, this means an attacker could impersonate an administrator, steal authentication cookies or tokens, and perform unauthorized actions on behalf of the victim. Because the affected endpoints are part of the core interface, a successful attack undermines the trust and security of the entire application, potentially leading to a full compromise of the management interface and the data it controls. The impact is particularly severe in cases where the Web UI is exposed over a network without additional access restrictions, as it enables remote attackers to directly target users with crafted links or requests that trigger the vulnerability.",
 | 
						||
    "title": "pyLoad CNL and captcha handlers allow Code Injection via unsanitized parameters"
 | 
						||
  },
 | 
						||
  {
 | 
						||
    "advisoryKey": "GHSA-wv4w-6qv2-qqfg",
 | 
						||
    "affectedPackages": [
 | 
						||
      {
 | 
						||
        "type": "semver",
 | 
						||
        "identifier": "pkg:pypi/social-auth-app-django",
 | 
						||
        "platform": "PyPI",
 | 
						||
        "versionRanges": [
 | 
						||
          {
 | 
						||
            "fixedVersion": "5.6.0",
 | 
						||
            "introducedVersion": "0",
 | 
						||
            "lastAffectedVersion": null,
 | 
						||
            "primitives": {
 | 
						||
              "evr": null,
 | 
						||
              "hasVendorExtensions": false,
 | 
						||
              "nevra": null,
 | 
						||
              "semVer": {
 | 
						||
                "constraintExpression": null,
 | 
						||
                "exactValue": null,
 | 
						||
                "fixed": "5.6.0",
 | 
						||
                "fixedInclusive": false,
 | 
						||
                "introduced": "0",
 | 
						||
                "introducedInclusive": true,
 | 
						||
                "lastAffected": null,
 | 
						||
                "lastAffectedInclusive": true,
 | 
						||
                "style": "range"
 | 
						||
              },
 | 
						||
              "vendorExtensions": null
 | 
						||
            },
 | 
						||
            "provenance": {
 | 
						||
              "source": "osv",
 | 
						||
              "kind": "range",
 | 
						||
              "value": "pkg:pypi/social-auth-app-django",
 | 
						||
              "decisionReason": null,
 | 
						||
              "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
              "fieldMask": [
 | 
						||
                "affectedpackages[].versionranges[]"
 | 
						||
              ]
 | 
						||
            },
 | 
						||
            "rangeExpression": null,
 | 
						||
            "rangeKind": "semver"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "normalizedVersions": [
 | 
						||
          {
 | 
						||
            "scheme": "semver",
 | 
						||
            "type": "range",
 | 
						||
            "min": "0",
 | 
						||
            "minInclusive": true,
 | 
						||
            "max": "5.6.0",
 | 
						||
            "maxInclusive": false,
 | 
						||
            "value": null,
 | 
						||
            "notes": "osv:PyPI:GHSA-wv4w-6qv2-qqfg:pkg:pypi/social-auth-app-django"
 | 
						||
          }
 | 
						||
        ],
 | 
						||
        "statuses": [],
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "affected",
 | 
						||
            "value": "pkg:pypi/social-auth-app-django",
 | 
						||
            "decisionReason": null,
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "affectedpackages[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "aliases": [
 | 
						||
      "CVE-2025-61783",
 | 
						||
      "GHSA-wv4w-6qv2-qqfg"
 | 
						||
    ],
 | 
						||
    "canonicalMetricId": "osv:severity/medium",
 | 
						||
    "credits": [],
 | 
						||
    "cvssMetrics": [],
 | 
						||
    "cwes": [
 | 
						||
      {
 | 
						||
        "taxonomy": "cwe",
 | 
						||
        "identifier": "CWE-290",
 | 
						||
        "name": null,
 | 
						||
        "uri": "https://cwe.mitre.org/data/definitions/290.html",
 | 
						||
        "provenance": [
 | 
						||
          {
 | 
						||
            "source": "osv",
 | 
						||
            "kind": "weakness",
 | 
						||
            "value": "CWE-290",
 | 
						||
            "decisionReason": "database_specific.cwe_ids",
 | 
						||
            "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
            "fieldMask": [
 | 
						||
              "cwes[]"
 | 
						||
            ]
 | 
						||
          }
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "description": "### Impact\n\nUpon authentication, the user could be associated by e-mail even if the `associate_by_email` pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses.\n\n### Patches\n\n* https://github.com/python-social-auth/social-app-django/pull/803\n\n### Workarounds\n\nReview the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.",
 | 
						||
    "exploitKnown": false,
 | 
						||
    "language": "en",
 | 
						||
    "modified": "2025-10-09T17:57:29.916841+00:00",
 | 
						||
    "provenance": [
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "document",
 | 
						||
        "value": "https://osv.dev/vulnerability/GHSA-wv4w-6qv2-qqfg",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-09T17:08:05+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "source": "osv",
 | 
						||
        "kind": "mapping",
 | 
						||
        "value": "GHSA-wv4w-6qv2-qqfg",
 | 
						||
        "decisionReason": null,
 | 
						||
        "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
        "fieldMask": [
 | 
						||
          "advisory"
 | 
						||
        ]
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "published": "2025-10-09T17:08:05+00:00",
 | 
						||
    "references": [
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "PACKAGE",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/commit/10c80e2ebabeccd4e9c84ad0e16e1db74148ed4c",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/commit/10c80e2ebabeccd4e9c84ad0e16e1db74148ed4c"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/issues/220",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/issues/220"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/issues/231",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/issues/231"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/issues/634",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/issues/634"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/pull/803",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/pull/803"
 | 
						||
      },
 | 
						||
      {
 | 
						||
        "kind": null,
 | 
						||
        "provenance": {
 | 
						||
          "source": "osv",
 | 
						||
          "kind": "reference",
 | 
						||
          "value": "https://github.com/python-social-auth/social-app-django/security/advisories/GHSA-wv4w-6qv2-qqfg",
 | 
						||
          "decisionReason": null,
 | 
						||
          "recordedAt": "2025-10-15T14:48:57.9927932+00:00",
 | 
						||
          "fieldMask": [
 | 
						||
            "references[]"
 | 
						||
          ]
 | 
						||
        },
 | 
						||
        "sourceTag": "WEB",
 | 
						||
        "summary": null,
 | 
						||
        "url": "https://github.com/python-social-auth/social-app-django/security/advisories/GHSA-wv4w-6qv2-qqfg"
 | 
						||
      }
 | 
						||
    ],
 | 
						||
    "severity": "medium",
 | 
						||
    "summary": "### Impact Upon authentication, the user could be associated by e-mail even if the `associate_by_email` pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses. ### Patches * https://github.com/python-social-auth/social-app-django/pull/803 ### Workarounds Review the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.",
 | 
						||
    "title": "Python Social Auth - Django has unsafe account association"
 | 
						||
  }
 | 
						||
]
 |