<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T13:08:27.941703+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/42920696-028d-4f2a-a747-966c477ddaea/export</id>
    <title>42920696-028d-4f2a-a747-966c477ddaea</title>
    <updated>2026-05-02T13:08:28.358650+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "42920696-028d-4f2a-a747-966c477ddaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-9582-88HR-54W3", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27137\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Dependency-Track allows users with the `SYSTEM_CONFIGURATION` permission to customize notification templates. Templates are evaluated using the Pebble template engine. Pebble supports an `include` tag, which allows template authors to include the content of arbitrary files upon evaluation. Prior to version 4.12.6, users of Dependency-Track with the `SYSTEM_CONFIGURATION` permission can abuse the `include` tag by crafting notification templates that `include` sensitive local files, such as `/etc/passwd` or `/proc/1/environ`. By configuring such a template for a notification rule (aka \"Alert\"), and having it send notifications to a destination controlled by the actor, sensitive information may be leaked. The issue has been fixed in Dependency-Track 4.12.6. In fixed versions, the `include` tag can no longer be used. Usage of the tag will cause template evaluation to fail. As a workaround, avoid assigning the `SYSTEM_CONFIGURATION` permission to untrusted users. The `SYSTEM_CONFIGURATION` permission per default is only granted to members of the `Administrators` team. Assigning this permission to non-administrative users or teams is a security risk in itself, and highly discouraged.\n\ud83d\udccf Published: 2025-02-24T20:59:50.974Z\n\ud83d\udccf Modified: 2025-02-24T20:59:50.974Z\n\ud83d\udd17 References:\n1. https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-9582-88hr-54w3\n2. https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-p75g-cxfj-7wrx\n3. https://github.com/PebbleTemplates/pebble/issues/680\n4. https://github.com/DependencyTrack/dependency-track/pull/4684\n5. https://github.com/DependencyTrack/dependency-track/pull/4685\n6. https://pebbletemplates.io/wiki/tag/include", "creation_timestamp": "2025-02-24T21:25:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/42920696-028d-4f2a-a747-966c477ddaea/export"/>
    <published>2025-02-24T21:25:44+00:00</published>
  </entry>
</feed>
