Skip to content

Commit 69d05d7

Browse files
1 parent af190a9 commit 69d05d7

4 files changed

Lines changed: 109 additions & 7 deletions

File tree

advisories/github-reviewed/2020/09/GHSA-4xf9-pgvv-xx67/GHSA-4xf9-pgvv-xx67.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4xf9-pgvv-xx67",
4-
"modified": "2021-09-29T18:16:33Z",
4+
"modified": "2026-02-03T17:52:55Z",
55
"published": "2020-09-03T20:27:46Z",
6+
"withdrawn": "2026-02-03T17:52:55Z",
67
"aliases": [],
7-
"summary": "Regular Expression Denial of Service in simple-markdown",
8-
"details": "Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.\n\n\n## Recommendation\n\nUpgrade to version 0.5.2 or later.",
8+
"summary": "Duplicate Advisory: Regular Expression Denial of Service in simple-markdown",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-gpvj-gp8c-c7p2. This link is maintained to preserve external references.\n\n## Original Description\n\nVersions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.\n\n\n## Recommendation\n\nUpgrade to version 0.5.2 or later.",
910
"severity": [
1011
{
1112
"type": "CVSS_V3",

advisories/github-reviewed/2023/02/GHSA-gpvj-gp8c-c7p2/GHSA-gpvj-gp8c-c7p2.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gpvj-gp8c-c7p2",
4-
"modified": "2023-02-24T16:01:14Z",
4+
"modified": "2026-02-03T17:53:00Z",
55
"published": "2023-02-12T15:30:24Z",
66
"aliases": [
77
"CVE-2019-25103"
@@ -40,6 +40,10 @@
4040
"type": "ADVISORY",
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25103"
4242
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/Khan/simple-markdown/issues/71"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/ariabuckles/simple-markdown/commit/89797fef9abb4cab2fb76a335968266a92588816"
@@ -52,6 +56,10 @@
5256
"type": "WEB",
5357
"url": "https://github.com/ariabuckles/simple-markdown/releases/tag/0.5.2"
5458
},
59+
{
60+
"type": "WEB",
61+
"url": "https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540"
62+
},
5563
{
5664
"type": "WEB",
5765
"url": "https://vuldb.com/?ctiid.220639"

advisories/github-reviewed/2023/12/GHSA-mhpq-9638-x6pw/GHSA-mhpq-9638-x6pw.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mhpq-9638-x6pw",
4-
"modified": "2024-07-05T21:36:26Z",
4+
"modified": "2026-02-03T17:53:34Z",
55
"published": "2023-12-20T20:31:57Z",
6+
"withdrawn": "2026-02-03T17:53:34Z",
67
"aliases": [],
7-
"summary": "Denial of service when decrypting attack controlled input in github.com/dvsekhvalnov/jose2go",
8-
"details": "An attacker controlled input of a PBES2 encrypted JWE blob can have a very large p2c value that, when decrypted, produces a denial-of-service. ",
8+
"summary": "Duplicate Advisory: Denial of service when decrypting attack controlled input in github.com/dvsekhvalnov/jose2go",
9+
"details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-6294-6rgp-fr7r. This link is maintained to preserve external references.\n\n## Original Description\n\nAn attacker controlled input of a PBES2 encrypted JWE blob can have a very large p2c value that, when decrypted, produces a denial-of-service.",
910
"severity": [
1011
{
1112
"type": "CVSS_V3",
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gjx9-j8f8-7j74",
4+
"modified": "2026-02-03T17:52:55Z",
5+
"published": "2026-02-03T17:52:55Z",
6+
"aliases": [
7+
"CVE-2026-25526"
8+
],
9+
"summary": "JinJava Bypass through ForTag leads to Arbitrary Java Execution",
10+
"details": "## Impact\n\n**Vulnerability Type**: Sandbox Bypass / Remote Code Execution\n\n**Affected Component**: Jinjava\n\n**Affected Users**:\n- Organizations using HubSpot's Jinjava template rendering engine for user-provided template content\n- Any system that renders untrusted Jinja templates using HubSpot's Jinjava implementation\n- Users with the ability to create or edit custom code templates\n\n**Severity**: **Critical** - allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions\n\n**Root Cause**: Multiple security bypass vulnerabilities in Jinjava's sandbox mechanism:\n\n1. **ForTag Property Access Bypass**: The `ForTag` class does not enforce `JinjavaBeanELResolver` restrictions when iterating over object properties using `Introspector.getBeanInfo()` and invoking getter methods via `PropertyDescriptor.getReadMethod()`\n\n2. **Restricted Class Instantiation**: The sandbox's type allowlist can be bypassed by using ObjectMapper to instantiate classes through JSON deserialization, including creating new `JinjavaELContext` and `JinjavaConfig` instances\n\n**Attack Vector**: An attacker with the ability to create or edit Jinja templates can:\n- Access arbitrary getter methods on objects in the template context\n- Instantiate `ObjectMapper` to enable default typing\n- Create arbitrary Java classes by bypassing type allowlists\n- Read files from the server filesystem (demonstrated with `/etc/passwd`)\n- Potentially execute arbitrary code\n\n## Patches\n\n**Status**: Patched - CVE-2026-25526\n\nUsers should upgrade to one of the following versions which contain fixes for this vulnerability:\n\n- **JinJava 2.8.3** or later\n- **JinJava 2.7.6** or later\n\n**Fix Components**:\n\n1. **ForTag Security Hardening**\n - Added security checks to `ForTag.renderForCollection()` to enforce `JinjavaBeanELResolver` restrictions\n - Implemented property access validation against restricted properties/methods before invoking getter methods\n - Added checks for restricted class types before introspection\n\n2. **Enhanced Type Validation**\n - Improved validation in `JinjavaBeanELResolver.isRestrictedClass()` to prevent instantiation of sensitive types\n - Added additional restricted types to the denylist\n - Implemented deeper validation for types created via ObjectMapper deserialization\n\n3. **Configuration Protection**\n - Added checks to prevent creation of new `JinjavaConfig` or `JinjavaELContext` instances via ObjectMapper\n - Prevented modification of `readOnlyResolver` configuration from untrusted templates\n - Implemented additional safeguards around ELResolver configuration\n\n4. **Collection Type Validation**\n - Implemented proper type validation in `HubLELResolver` to prevent collection type wrapping bypasses\n - Added checks for wrapped types in collection deserialization\n - Implemented validation for all types within collections against allowlists\n\n5. **ObjectMapper Restrictions**\n - Added additional restrictions on `ObjectMapper.enableDefaultTyping()` to prevent enabling via less restrictive ELResolver\n - Ensured default typing cannot be enabled without proper authorization\n\n**Information for Users**: Upgrade to version 2.8.3 or 2.7.6 or later to address this vulnerability.\n\n## References\n\n### Project Resources\n- **Jinjava Source Code**: [github.com/HubSpot/jinjava](https://github.com/HubSpot/jinjava)\n- **Jinjava Releases**: [github.com/HubSpot/jinjava/releases](https://github.com/HubSpot/jinjava/releases)\n\n### Security Standards & Classifications\n- **CWE-502**: Deserialization of Untrusted Data\n- **CWE-913**: Improper Control of Dynamically-Managed Code Resources\n- **CWE-94**: Improper Control of Generation of Code ('Code Injection')\n- **CVSS v3.1**: Common Vulnerability Scoring System\n\n### Additional Resources\n- [OWASP Template Injection](https://owasp.org/www-community/attacks/Server_Side_Template_Injection)\n- [Java Deserialization Security](https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html)\n- [CVE Standards and Procedures](https://cve.mitre.org/)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "com.hubspot.jinjava:jinjava"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.8.0"
29+
},
30+
{
31+
"fixed": "2.8.3"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "com.hubspot.jinjava:jinjava"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "2.7.6"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/HubSpot/jinjava/security/advisories/GHSA-gjx9-j8f8-7j74"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/HubSpot/jinjava/commit/3d02e504d8bbb13bf3fe019e9ca7b51dfce7a998"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/HubSpot/jinjava/commit/c7328dce6030ac718f88974196035edafef24441"
69+
},
70+
{
71+
"type": "PACKAGE",
72+
"url": "https://github.com/HubSpot/jinjava"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.7.6"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.8.3"
81+
}
82+
],
83+
"database_specific": {
84+
"cwe_ids": [
85+
"CWE-1336"
86+
],
87+
"severity": "CRITICAL",
88+
"github_reviewed": true,
89+
"github_reviewed_at": "2026-02-03T17:52:55Z",
90+
"nvd_published_at": null
91+
}
92+
}

0 commit comments

Comments
 (0)