Show filters
645 Total Results
Displaying 111-120 of 645
Sort by:
Attacker Value
Unknown

CVE-2024-21496

Disclosure Date: February 17, 2024 (last updated February 17, 2024)
All versions of the package github.com/greenpau/caddy-security are vulnerable to Cross-site Scripting (XSS) via the Referer header, due to improper input sanitization. Although the Referer header is sanitized by escaping some characters that can allow XSS (e.g., [&], [<], [>], ["], [']), it does not account for the attack based on the JavaScript URL scheme (e.g., javascript:alert(document.domain)// payload). Exploiting this vulnerability may not be trivial, but it could lead to the execution of malicious scripts in the context of the target user’s browser, compromising user sessions.
0
Attacker Value
Unknown

CVE-2024-21495

Disclosure Date: February 17, 2024 (last updated February 17, 2024)
Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package.
0
Attacker Value
Unknown

CVE-2024-21494

Disclosure Date: February 17, 2024 (last updated February 17, 2024)
All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address.
0
Attacker Value
Unknown

CVE-2024-21493

Disclosure Date: February 17, 2024 (last updated February 17, 2024)
All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements, which can lead to a panic (index out of range). Panics during the parsing of a configuration file may introduce ambiguity and vulnerabilities, hindering the correct interpretation and configuration of the web server.
0
Attacker Value
Unknown

CVE-2024-21492

Disclosure Date: February 17, 2024 (last updated February 17, 2024)
All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.
0
Attacker Value
Unknown

CVE-2024-20679

Disclosure Date: February 13, 2024 (last updated February 27, 2024)
Azure Stack Hub Spoofing Vulnerability
Attacker Value
Unknown

CVE-2024-0242

Disclosure Date: February 08, 2024 (last updated February 16, 2024)
Under certain circumstances IQ Panel4 and IQ4 Hub panel software prior to version 4.4.2 could allow unauthorized access to settings.
Attacker Value
Unknown

CVE-2024-23903

Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Attacker Value
Unknown

CVE-2024-23902

Disclosure Date: January 24, 2024 (last updated February 01, 2024)
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.
Attacker Value
Unknown

CVE-2024-23901

Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group.