CVE-2023-2585 3.5 LOW CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 3 months ago Keycloak: client access via device auth request spoof Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client. Affected products keycloak rh-sso7-keycloak * rh-sso-7/sso76-openshift-rhel8 * Matching in nixpkgs pkgs.keycloak Identity and access management for modern applications and services nixos-unstable ??? nixpkgs-unstable 26.3.4 pkgs.terraform-providers.keycloak nixos-unstable ??? nixpkgs-unstable 5.4.0 pkgs.python312Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0 pkgs.python313Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0 Package maintainers: 4 @ngerstle Nicholas Gerstle <ngerstle@gmail.com> @NickCao Nick Cao <nickcao@nichi.co> @talyz Kim Lindberger <kim.lindberger@gmail.com> @leona-ya Leona Maroni <nix@leona.is>
pkgs.keycloak Identity and access management for modern applications and services nixos-unstable ??? nixpkgs-unstable 26.3.4
pkgs.python312Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0
pkgs.python313Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0
CVE-2023-1260 8.0 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Kube-apiserver: privesc An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod. Affected products openshift * microshift * openshift4/ose-pod openshift4/ose-tests openshift4/ose-openshift-apiserver-rhel7 github.com/openshift/apiserver-library-go * Matching in nixpkgs pkgs.openshift Build, deploy, and manage your applications with Docker and Kubernetes nixos-unstable ??? nixpkgs-unstable 4.16.0 pkgs.python312Packages.openshift Python client for the OpenShift API nixos-unstable ??? nixpkgs-unstable 0.13.2 pkgs.python313Packages.openshift Python client for the OpenShift API nixos-unstable ??? nixpkgs-unstable 0.13.2 pkgs.python312Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 2.0.0 pkgs.python313Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 2.0.0 Package maintainers: 4 @teto Matthieu Coudron <mcoudron@hotmail.com> @offlinehacker Jaka Hudoklin <jaka@x-truder.net> @stehessel Stephan Heßelmann <stephan@stehessel.de> @moretea Maarten Hoogendoorn <maarten@moretea.nl>
pkgs.openshift Build, deploy, and manage your applications with Docker and Kubernetes nixos-unstable ??? nixpkgs-unstable 4.16.0
pkgs.python312Packages.openshift Python client for the OpenShift API nixos-unstable ??? nixpkgs-unstable 0.13.2
pkgs.python313Packages.openshift Python client for the OpenShift API nixos-unstable ??? nixpkgs-unstable 0.13.2
pkgs.python312Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 2.0.0
pkgs.python313Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 2.0.0
CVE-2022-3916 6.8 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 3 months ago Keycloak: session takeover with oidc offline refreshtokens A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user. Affected products keycloak rh-sso7-keycloak * rh-sso-7/sso76-openshift-rhel8 * Matching in nixpkgs pkgs.keycloak Identity and access management for modern applications and services nixos-unstable ??? nixpkgs-unstable 26.3.4 pkgs.terraform-providers.keycloak nixos-unstable ??? nixpkgs-unstable 5.4.0 pkgs.python312Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0 pkgs.python313Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0 Package maintainers: 4 @ngerstle Nicholas Gerstle <ngerstle@gmail.com> @NickCao Nick Cao <nickcao@nichi.co> @talyz Kim Lindberger <kim.lindberger@gmail.com> @leona-ya Leona Maroni <nix@leona.is>
pkgs.keycloak Identity and access management for modern applications and services nixos-unstable ??? nixpkgs-unstable 26.3.4
pkgs.python312Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0
pkgs.python313Packages.python-keycloak Provides access to the Keycloak API nixos-unstable ??? nixpkgs-unstable 4.0.0
CVE-2022-3466 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 3 months ago Cri-o: security regression of cve-2022-27652 The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, which was previously fixed in OCP 4.9.41 and 4.10.12 via RHBA-2022:5433 and RHSA-2022:1600. This issue could allow an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. For more details, see https://access.redhat.com/security/cve/CVE-2022-27652. Affected products cri-o * Matching in nixpkgs pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 Package maintainers: 2 @vdemeester Vincent Demeester <vincent@sbr.pm> @saschagrunert Sascha Grunert <mail@saschagrunert.de>
pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
CVE-2023-0119 5.4 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 3 months ago Foreman: stored cross-site scripting in host tab A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials. Affected products foreman ==3.5.2 * ==3.6.0 ==3.4.2 ==3.5.1.16 Matching in nixpkgs pkgs.foreman Process manager for applications with multiple components nixos-unstable ??? nixpkgs-unstable 0.87.2 Package maintainers: 1 @zimbatm zimbatm <zimbatm@zimbatm.com>
pkgs.foreman Process manager for applications with multiple components nixos-unstable ??? nixpkgs-unstable 0.87.2
CVE-2022-4318 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Cri-o: /etc/passwd tampering privesc A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable. Affected products cri-o * fence-agents Matching in nixpkgs pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 Package maintainers: 2 @vdemeester Vincent Demeester <vincent@sbr.pm> @saschagrunert Sascha Grunert <mail@saschagrunert.de>
pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
CVE-2023-0118 9.1 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Foreman: arbitrary code execution through templates An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system. Affected products foreman * rubygem-safemode * Matching in nixpkgs pkgs.foreman Process manager for applications with multiple components nixos-unstable ??? nixpkgs-unstable 0.87.2 Package maintainers: 1 @zimbatm zimbatm <zimbatm@zimbatm.com>
pkgs.foreman Process manager for applications with multiple components nixos-unstable ??? nixpkgs-unstable 0.87.2
CVE-2024-33952 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 3 months ago WordPress Unique theme <= 0.3.0 - Cross Site Scripting (XSS) vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Tadlock Unique allows Stored XSS.This issue affects Unique: from n/a through 0.3.0. Affected products unique =<0.3.0 Matching in nixpkgs pkgs.libunique Library for writing single instance applications nixos-unstable ??? nixpkgs-unstable 1.1.6 pkgs.libunique3 Library for writing single instance applications nixos-unstable ??? nixpkgs-unstable 3.0.2 pkgs.haskellPackages.unique Fully concurrent unique identifiers nixos-unstable ??? nixpkgs-unstable 0.0.1 pkgs.haskellPackages.unique-logic Solve simple simultaneous equations nixos-unstable ??? nixpkgs-unstable 0.4.0.1 pkgs.haskellPackages.unique-logic-tf Solve simple simultaneous equations nixos-unstable ??? nixpkgs-unstable 0.5.1 pkgs.python312Packages.unique-log-filter Log filter that removes duplicate log messages nixos-unstable ??? nixpkgs-unstable 0.1.0 pkgs.python313Packages.unique-log-filter Log filter that removes duplicate log messages nixos-unstable ??? nixpkgs-unstable 0.1.0 pkgs.haskellPackages.uniqueness-periods-vector-stats A very basic descriptive statistics nixos-unstable ??? nixpkgs-unstable 0.4.0.0 Package maintainers: 2 @fabaff Fabian Affolter <mail@fabian-affolter.ch> @thielema Henning Thielemann <nix@henning-thielemann.de>
pkgs.libunique Library for writing single instance applications nixos-unstable ??? nixpkgs-unstable 1.1.6
pkgs.libunique3 Library for writing single instance applications nixos-unstable ??? nixpkgs-unstable 3.0.2
pkgs.haskellPackages.unique Fully concurrent unique identifiers nixos-unstable ??? nixpkgs-unstable 0.0.1
pkgs.haskellPackages.unique-logic Solve simple simultaneous equations nixos-unstable ??? nixpkgs-unstable 0.4.0.1
pkgs.haskellPackages.unique-logic-tf Solve simple simultaneous equations nixos-unstable ??? nixpkgs-unstable 0.5.1
pkgs.python312Packages.unique-log-filter Log filter that removes duplicate log messages nixos-unstable ??? nixpkgs-unstable 0.1.0
pkgs.python313Packages.unique-log-filter Log filter that removes duplicate log messages nixos-unstable ??? nixpkgs-unstable 0.1.0
pkgs.haskellPackages.uniqueness-periods-vector-stats A very basic descriptive statistics nixos-unstable ??? nixpkgs-unstable 0.4.0.0
CVE-2024-4128 2.6 LOW CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): NONE Availability impact (A): NONE created 3 months ago CSRF in firebase-tools emulator suite This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit 068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 Affected products firebase-tools =<13.6.0 Matching in nixpkgs pkgs.firebase-tools Manage, and deploy your Firebase project from the command line nixos-unstable ??? nixpkgs-unstable 14.16.0 Package maintainers: 2 @sarahec Sarah Clark <seclark@nextquestion.net> @momeemt Mutsuha Asada <me@momee.mt>
pkgs.firebase-tools Manage, and deploy your Firebase project from the command line nixos-unstable ??? nixpkgs-unstable 14.16.0
CVE-2023-46288 created 3 months ago Apache Airflow: Sensitive parameters exposed in API when "non-sensitive-only" configuration is set Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.4.0 to 2.7.0. Sensitive configuration information has been exposed to authenticated users with the ability to read configuration via Airflow REST API for configuration even when the expose_config option is set to non-sensitive-only. The expose_config option is False by default. It is recommended to upgrade to a version that is not affected if you set expose_config to non-sensitive-only configuration. This is a different error than CVE-2023-45348 which allows authenticated user to retrieve individual configuration values in 2.7.* by specially crafting their request (solved in 2.7.2). Users are recommended to upgrade to version 2.7.2, which fixes the issue and additionally fixes CVE-2023-45348. Affected products apache-airflow <2.7.0 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable ??? nixpkgs-unstable 2.7.3 Package maintainers: 3 @ingenieroariel Ariel Nunez <ariel@nunez.co> @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com>
pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable ??? nixpkgs-unstable 2.7.3