Skip to content

Commit 5dfd548

Browse files
1 parent a90f1b5 commit 5dfd548

File tree

3 files changed

+115
-45
lines changed

3 files changed

+115
-45
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-33hj-rcmx-86mv",
4+
"modified": "2026-02-01T18:07:04Z",
5+
"published": "2026-01-30T15:31:14Z",
6+
"aliases": [
7+
"CVE-2024-4027"
8+
],
9+
"summary": "Undertow Servlets Vulnerable to Remote DoS via OutOfMemoryError when Passed Large Parameter Names",
10+
"details": "A flaw was found in Undertow. Servlets using a method that calls HttpServletRequestImpl.getParameterNames() can cause an OutOfMemoryError when the client sends a request with large parameter names. This issue can be exploited by an unauthorized user to cause a remote denial-of-service (DoS) attack.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "io.undertow:undertow-core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.3.21.Final"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4027"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/undertow-io/undertow/commit/6b7c18481ce65ae4012d92fe2b7f17a21ef4d70b"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://access.redhat.com/security/cve/CVE-2024-4027"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276410"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/undertow-io/undertow"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/undertow-io/undertow/releases/tag/2.3.21.Final"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://issues.redhat.com/browse/UNDERTOW-2377"
66+
}
67+
],
68+
"database_specific": {
69+
"cwe_ids": [
70+
"CWE-770"
71+
],
72+
"severity": "HIGH",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-02-01T18:07:04Z",
75+
"nvd_published_at": "2026-01-30T15:16:07Z"
76+
}
77+
}

advisories/unreviewed/2026/01/GHSA-77w2-v593-vxvv/GHSA-77w2-v593-vxvv.json renamed to advisories/github-reviewed/2026/01/GHSA-77w2-v593-vxvv/GHSA-77w2-v593-vxvv.json

Lines changed: 38 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-77w2-v593-vxvv",
4-
"modified": "2026-01-30T21:30:22Z",
4+
"modified": "2026-02-01T18:07:48Z",
55
"published": "2026-01-30T21:30:22Z",
66
"aliases": [
77
"CVE-2025-62348"
88
],
9+
"summary": "Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload",
910
"details": "Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.",
1011
"severity": [
1112
{
@@ -14,27 +15,59 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "salt"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "3006.17"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62348"
2546
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/saltstack/salt/issues/68469"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/saltstack/salt/pull/68472/commits/c17fd645edef208233dcac855615fced69409a00"
54+
},
2655
{
2756
"type": "WEB",
2857
"url": "https://docs.saltproject.io/en/latest/topics/releases/3006.17.html"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/saltstack/salt"
2962
}
3063
],
3164
"database_specific": {
3265
"cwe_ids": [
3366
"CWE-94"
3467
],
3568
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-02-01T18:07:48Z",
3871
"nvd_published_at": "2026-01-30T19:16:10Z"
3972
}
4073
}

advisories/unreviewed/2026/01/GHSA-33hj-rcmx-86mv/GHSA-33hj-rcmx-86mv.json

Lines changed: 0 additions & 40 deletions
This file was deleted.

0 commit comments

Comments
 (0)