Skip to content

Commit 8647c0f

Browse files

File tree

6 files changed

+263
-93
lines changed

6 files changed

+263
-93
lines changed
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g78f-6xq7-rrhq",
4+
"modified": "2025-12-05T21:47:57Z",
5+
"published": "2022-05-24T17:21:04Z",
6+
"aliases": [
7+
"CVE-2017-18885"
8+
],
9+
"summary": "Mattermost Server allows attackers to gain privileges by accessing unintended API endpoints with users' credentials",
10+
"details": "An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows attackers to gain privileges by accessing unintended API endpoints on a user's behalf.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/mattermost/mattermost-server"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "4.1.2"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/mattermost/mattermost-server"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "4.2.0-rc1"
48+
},
49+
{
50+
"fixed": "4.2.1"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/mattermost/mattermost-server"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "4.3.0-rc1"
67+
},
68+
{
69+
"fixed": "4.3.0"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18885"
80+
},
81+
{
82+
"type": "PACKAGE",
83+
"url": "https://github.com/mattermost/mattermost"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://mattermost.com/security-updates"
88+
}
89+
],
90+
"database_specific": {
91+
"cwe_ids": [
92+
"CWE-269"
93+
],
94+
"severity": "CRITICAL",
95+
"github_reviewed": true,
96+
"github_reviewed_at": "2025-12-05T21:47:57Z",
97+
"nvd_published_at": "2020-06-19T19:15:00Z"
98+
}
99+
}
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-wvjg-33p9-938h",
4+
"modified": "2025-12-05T21:48:05Z",
5+
"published": "2022-05-24T17:21:04Z",
6+
"aliases": [
7+
"CVE-2017-18886"
8+
],
9+
"summary": "Mattermost Server does not properly restrict use of slash commands",
10+
"details": "An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows a bypass of restrictions on use of slash commands.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/mattermost/mattermost-server"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "4.1.2"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/mattermost/mattermost-server"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "4.2.0-rc1"
48+
},
49+
{
50+
"fixed": "4.2.1"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/mattermost/mattermost-server"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "4.3.0-rc1"
67+
},
68+
{
69+
"fixed": "4.3.0"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18886"
80+
},
81+
{
82+
"type": "PACKAGE",
83+
"url": "https://github.com/mattermost/mattermost"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://mattermost.com/security-updates"
88+
}
89+
],
90+
"database_specific": {
91+
"cwe_ids": [
92+
"CWE-732"
93+
],
94+
"severity": "HIGH",
95+
"github_reviewed": true,
96+
"github_reviewed_at": "2025-12-05T21:48:05Z",
97+
"nvd_published_at": "2020-06-19T19:15:00Z"
98+
}
99+
}
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-v6x2-4q87-rf82",
4+
"modified": "2025-12-05T21:46:59Z",
5+
"published": "2025-11-27T12:30:29Z",
6+
"aliases": [
7+
"CVE-2025-54057"
8+
],
9+
"summary": "Apache SkyWalking has a stored XSS vulnerability",
10+
"details": "There is an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache SkyWalking.\n\nThis issue affects Apache SkyWalking versions <= 10.2.0.\n\nUsers are recommended to upgrade to version 10.3.0, which fixes the issue. Version 10.3.0 has not been uploaded to the Maven registry at time of publish, please see [release notes](https://github.com/apache/skywalking/releases/tag/v10.3.0) for download instructions.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.apache.skywalking:apm-webapp"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "10.1.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54057"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/apache/skywalking"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://lists.apache.org/thread/sl2x2tx8y007x0mo746yddx2lvnv9tcr"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "http://www.openwall.com/lists/oss-security/2025/11/27/1"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-80"
59+
],
60+
"severity": "MODERATE",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-12-05T21:46:59Z",
63+
"nvd_published_at": "2025-11-27T12:15:47Z"
64+
}
65+
}

advisories/unreviewed/2022/05/GHSA-g78f-6xq7-rrhq/GHSA-g78f-6xq7-rrhq.json

Lines changed: 0 additions & 29 deletions
This file was deleted.

advisories/unreviewed/2022/05/GHSA-wvjg-33p9-938h/GHSA-wvjg-33p9-938h.json

Lines changed: 0 additions & 29 deletions
This file was deleted.

advisories/unreviewed/2025/11/GHSA-v6x2-4q87-rf82/GHSA-v6x2-4q87-rf82.json

Lines changed: 0 additions & 35 deletions
This file was deleted.

0 commit comments

Comments
 (0)