Skip to content

File tree

18 files changed

+122
-38
lines changed

18 files changed

+122
-38
lines changed

advisories/github-reviewed/2026/04/GHSA-2wvg-62qm-gj33/GHSA-2wvg-62qm-gj33.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2wvg-62qm-gj33",
4-
"modified": "2026-04-04T04:18:43Z",
4+
"modified": "2026-04-06T23:43:23Z",
55
"published": "2026-04-04T04:18:43Z",
66
"aliases": [
77
"CVE-2026-35187"
@@ -40,6 +40,14 @@
4040
"type": "WEB",
4141
"url": "https://github.com/pyload/pyload/security/advisories/GHSA-2wvg-62qm-gj33"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35187"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/pyload/pyload/commit/4032e57d61d8f864e39f4dcfdb567527a50a9e1f"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/pyload/pyload"
@@ -52,6 +60,6 @@
5260
"severity": "HIGH",
5361
"github_reviewed": true,
5462
"github_reviewed_at": "2026-04-04T04:18:43Z",
55-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-06T20:16:27Z"
5664
}
5765
}

advisories/github-reviewed/2026/04/GHSA-3p65-76g6-3w7r/GHSA-3p65-76g6-3w7r.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3p65-76g6-3w7r",
4-
"modified": "2026-04-06T17:52:52Z",
4+
"modified": "2026-04-06T23:42:43Z",
55
"published": "2026-04-06T17:52:52Z",
66
"aliases": [
77
"CVE-2026-33540"
88
],
99
"summary": "Distribution affected by pull-through cache credential exfiltration via www-authenticate bearer realm",
10-
"details": "commit: 40594bd98e6d6ed993b5c6021c93fdf96d2e5851 (as-of 2026-01-31)\ncontact: GitHub Security Advisory (https://github.com/distribution/distribution/security/advisories/new)\n\n## summary\n\nin pull-through cache mode, distribution discovers token auth endpoints by parsing `WWW-Authenticate` challenges returned by the configured upstream registry. the `realm` URL from a bearer challenge is used without validating that it matches the upstream registry host. as a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled `realm` URL.\n\nthis is the same vulnerability class as CVE-2020-15157 (containerd), but in distribution’s pull-through cache proxy auth flow.\n\n## severity\n\nHIGH\n\nnote: the baseline impact is credential disclosure of the configured upstream credentials. if a deployment uses broader credentials for upstream auth (for example cloud iam credentials), the downstream impact can be higher; i am not claiming this as default for all deployments.\n\n## impact\n\ncredential exfiltration of the upstream authentication material configured for the pull-through cache.\n\nattacker starting positions that make this realistic:\n- supply chain / configuration: an operator configures a proxy cache to use an upstream that becomes attacker-controlled (compromised registry, stale domain, or a malicious mirror)\n- network: MitM on the upstream connection in environments where the upstream is reachable over insecure transport or a compromised network path\n\n## affected components\n\n- `registry/proxy/proxyauth.go:66-81` (`getAuthURLs`): extracts bearer `realm` from upstream `WWW-Authenticate` without validating destination\n- `internal/client/auth/session.go:485-510` (`fetchToken`): uses the realm URL directly for token fetch\n- `internal/client/auth/session.go:429-434` (`fetchTokenWithBasicAuth`): sends credentials via basic auth to the realm URL\n\n## reproduction\n\nattachment: `poc.zip` (local harness) with canonical and control runs.\n\nthe harness is local and does not contact a real registry: it uses two local HTTP servers (upstream + attacker token service) to demonstrate whether basic auth is sent to an attacker-chosen realm.\n\n```bash\nunzip -q -o poc.zip -d poc\ncd poc\nmake canonical\nmake control\n```\n\nexpected output (excerpt):\n\n```\n[CALLSITE_HIT]: getAuthURLs::configureAuth\n[PROOF_MARKER]: basic_auth_sent=true realm_host=127.0.0.1 account_param=user authorization_prefix=Basic\n```\n\ncontrol output (excerpt):\n\n```\n[CALLSITE_HIT]: getAuthURLs::configureAuth\n[NC_MARKER]: realm_validation=PASS basic_auth_sent=false\n```\n\n## suggested remediation\n\nvalidate that the token `realm` destination is within the intended trust boundary before associating credentials with it or sending any authentication to it. one conservative option is strict same-host binding: only accept a realm whose host matches the configured upstream host.\n\n## fix accepted when\n\n- distribution does not send configured upstream credentials to an attacker-chosen realm URL\n- a regression test covers the canonical and blocked cases\n\n[addendum.md](https://github.com/user-attachments/files/24984637/addendum.md)\n[poc.zip](https://github.com/user-attachments/files/24984638/poc.zip)\n[PR_DESCRIPTION.md](https://github.com/user-attachments/files/24984639/PR_DESCRIPTION.md)\n[RUNNABLE_POC.md](https://github.com/user-attachments/files/24984640/RUNNABLE_POC.md)",
10+
"details": "hi guys,\n\ncommit: 40594bd98e6d6ed993b5c6021c93fdf96d2e5851 (as-of 2026-01-31)\ncontact: GitHub Security Advisory (https://github.com/distribution/distribution/security/advisories/new)\n\n## summary\n\nin pull-through cache mode, distribution discovers token auth endpoints by parsing `WWW-Authenticate` challenges returned by the configured upstream registry. the `realm` URL from a bearer challenge is used without validating that it matches the upstream registry host. as a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled `realm` URL.\n\nthis is the same vulnerability class as CVE-2020-15157 (containerd), but in distribution’s pull-through cache proxy auth flow.\n\n## severity\n\nHIGH\n\nnote: the baseline impact is credential disclosure of the configured upstream credentials. if a deployment uses broader credentials for upstream auth (for example cloud iam credentials), the downstream impact can be higher; i am not claiming this as default for all deployments.\n\n## impact\n\ncredential exfiltration of the upstream authentication material configured for the pull-through cache.\n\nattacker starting positions that make this realistic:\n- supply chain / configuration: an operator configures a proxy cache to use an upstream that becomes attacker-controlled (compromised registry, stale domain, or a malicious mirror)\n- network: MitM on the upstream connection in environments where the upstream is reachable over insecure transport or a compromised network path\n\n## affected components\n\n- `registry/proxy/proxyauth.go:66-81` (`getAuthURLs`): extracts bearer `realm` from upstream `WWW-Authenticate` without validating destination\n- `internal/client/auth/session.go:485-510` (`fetchToken`): uses the realm URL directly for token fetch\n- `internal/client/auth/session.go:429-434` (`fetchTokenWithBasicAuth`): sends credentials via basic auth to the realm URL\n\n## reproduction\n\nattachment: `poc.zip` (local harness) with canonical and control runs.\n\nthe harness is local and does not contact a real registry: it uses two local HTTP servers (upstream + attacker token service) to demonstrate whether basic auth is sent to an attacker-chosen realm.\n\n```bash\nunzip -q -o poc.zip -d poc\ncd poc\nmake canonical\nmake control\n```\n\nexpected output (excerpt):\n\n```\n[CALLSITE_HIT]: getAuthURLs::configureAuth\n[PROOF_MARKER]: basic_auth_sent=true realm_host=127.0.0.1 account_param=user authorization_prefix=Basic\n```\n\ncontrol output (excerpt):\n\n```\n[CALLSITE_HIT]: getAuthURLs::configureAuth\n[NC_MARKER]: realm_validation=PASS basic_auth_sent=false\n```\n\n## suggested remediation\n\nvalidate that the token `realm` destination is within the intended trust boundary before associating credentials with it or sending any authentication to it. one conservative option is strict same-host binding: only accept a realm whose host matches the configured upstream host.\n\n## fix accepted when\n\n- distribution does not send configured upstream credentials to an attacker-chosen realm URL\n- a regression test covers the canonical and blocked cases\n\n[addendum.md](https://github.com/user-attachments/files/24984637/addendum.md)\n[poc.zip](https://github.com/user-attachments/files/24984638/poc.zip)\n[PR_DESCRIPTION.md](https://github.com/user-attachments/files/24984639/PR_DESCRIPTION.md)\n[RUNNABLE_POC.md](https://github.com/user-attachments/files/24984640/RUNNABLE_POC.md)\n\n\nbest,\noleh",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2026/04/GHSA-436g-fhfc-9g5w/GHSA-436g-fhfc-9g5w.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-436g-fhfc-9g5w",
4-
"modified": "2026-04-03T03:44:39Z",
4+
"modified": "2026-04-06T23:41:13Z",
55
"published": "2026-04-03T03:44:39Z",
66
"aliases": [
77
"CVE-2026-35052"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/man-group/dtale/security/advisories/GHSA-436g-fhfc-9g5w"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35052"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/man-group/dtale"
@@ -52,6 +56,6 @@
5256
"severity": "MODERATE",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T03:44:39Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T18:16:42Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-4q27-4rrq-fx95/GHSA-4q27-4rrq-fx95.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4q27-4rrq-fx95",
4-
"modified": "2026-04-03T23:43:23Z",
4+
"modified": "2026-04-06T23:43:19Z",
55
"published": "2026-04-03T23:43:23Z",
66
"aliases": [
77
"CVE-2026-35181"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-4q27-4rrq-fx95"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35181"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/WWBN/AVideo"
@@ -52,6 +56,6 @@
5256
"severity": "MODERATE",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T23:43:23Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T20:16:26Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-5ghq-42rg-769x/GHSA-5ghq-42rg-769x.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5ghq-42rg-769x",
4-
"modified": "2026-04-06T17:53:02Z",
4+
"modified": "2026-04-06T23:41:42Z",
55
"published": "2026-04-06T17:53:02Z",
66
"aliases": [
77
"CVE-2026-35035"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-5ghq-42rg-769x"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35035"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/ci4-cms-erp/ci4ms"
@@ -59,6 +63,6 @@
5963
"severity": "CRITICAL",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-04-06T17:53:02Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-06T17:17:12Z"
6367
}
6468
}

advisories/github-reviewed/2026/04/GHSA-6326-w46w-ppjw/GHSA-6326-w46w-ppjw.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6326-w46w-ppjw",
4-
"modified": "2026-04-03T03:46:48Z",
4+
"modified": "2026-04-06T23:41:16Z",
55
"published": "2026-04-03T03:46:48Z",
66
"aliases": [
77
"CVE-2026-35167"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/kedro-org/kedro/security/advisories/GHSA-6326-w46w-ppjw"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35167"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/kedro-org/kedro/pull/5442"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-04-03T03:46:48Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-06T18:16:43Z"
6064
}
6165
}

advisories/github-reviewed/2026/04/GHSA-737v-mqg7-c878/GHSA-737v-mqg7-c878.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-737v-mqg7-c878",
4-
"modified": "2026-04-04T06:17:53Z",
4+
"modified": "2026-04-06T23:42:28Z",
55
"published": "2026-04-04T06:17:53Z",
66
"aliases": [
77
"CVE-2026-35209"
@@ -43,9 +43,25 @@
4343
"type": "WEB",
4444
"url": "https://github.com/unjs/defu/security/advisories/GHSA-737v-mqg7-c878"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35209"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/unjs/defu/pull/156"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/unjs/defu/commit/3942bfbbcaa72084bd4284846c83bd61ed7c8b29"
57+
},
4658
{
4759
"type": "PACKAGE",
4860
"url": "https://github.com/unjs/defu"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/unjs/defu/releases/tag/v6.1.5"
4965
}
5066
],
5167
"database_specific": {
@@ -55,6 +71,6 @@
5571
"severity": "HIGH",
5672
"github_reviewed": true,
5773
"github_reviewed_at": "2026-04-04T06:17:53Z",
58-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-06T18:16:44Z"
5975
}
6076
}

advisories/github-reviewed/2026/04/GHSA-73jv-44c3-j5p2/GHSA-73jv-44c3-j5p2.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-73jv-44c3-j5p2",
4-
"modified": "2026-04-03T03:57:43Z",
4+
"modified": "2026-04-06T23:41:37Z",
55
"published": "2026-04-03T03:57:43Z",
66
"aliases": [
77
"CVE-2026-35175"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/ajenti/ajenti/security/advisories/GHSA-73jv-44c3-j5p2"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35175"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/ajenti/ajenti"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-04-03T03:57:43Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-06T18:16:43Z"
6064
}
6165
}

advisories/github-reviewed/2026/04/GHSA-9cqf-439c-j96r/GHSA-9cqf-439c-j96r.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9cqf-439c-j96r",
4-
"modified": "2026-04-03T03:48:48Z",
4+
"modified": "2026-04-06T23:41:20Z",
55
"published": "2026-04-03T03:48:48Z",
66
"aliases": [
77
"CVE-2026-35171"
@@ -40,19 +40,23 @@
4040
"type": "WEB",
4141
"url": "https://github.com/kedro-org/kedro/security/advisories/GHSA-9cqf-439c-j96r"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35171"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/kedro-org/kedro"
4650
}
4751
],
4852
"database_specific": {
4953
"cwe_ids": [
50-
"CWE-94",
51-
"CWE-502"
54+
"CWE-502",
55+
"CWE-94"
5256
],
5357
"severity": "CRITICAL",
5458
"github_reviewed": true,
5559
"github_reviewed_at": "2026-04-03T03:48:48Z",
56-
"nvd_published_at": null
60+
"nvd_published_at": "2026-04-06T18:16:43Z"
5761
}
5862
}

advisories/github-reviewed/2026/04/GHSA-cqgf-f4x7-g6wc/GHSA-cqgf-f4x7-g6wc.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cqgf-f4x7-g6wc",
4-
"modified": "2026-04-03T03:33:00Z",
4+
"modified": "2026-04-06T23:41:08Z",
55
"published": "2026-04-03T03:33:00Z",
66
"aliases": [
77
"CVE-2026-35037"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/lin-snow/Ech0/security/advisories/GHSA-cqgf-f4x7-g6wc"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35037"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/lin-snow/Ech0"
@@ -52,6 +56,6 @@
5256
"severity": "HIGH",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T03:33:00Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T17:17:13Z"
5660
}
5761
}

0 commit comments

Comments
 (0)