{"vulnerability": "CVE-2021-2137", "sightings": [{"uuid": "2ba53881-3f94-4e39-98e2-3154b4fe02d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21371", "type": "seen", "source": "https://t.me/cibsecurity/24745", "content": "\u203c CVE-2021-21371 \u203c\n\nTenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as \"tenable-jira-cloud\". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-11T00:53:26.000000Z"}, {"uuid": "ba666640-e064-4cb2-b64d-6cedebc48e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21370", "type": "seen", "source": "https://t.me/cibsecurity/25277", "content": "\u203c CVE-2021-21370 \u203c\n\nTYPO3 is an open source PHP based web content management system. In TYPO3 before versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 it has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability. This is fixed in versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-23T06:38:06.000000Z"}, {"uuid": "5eb1edd8-d981-42cf-b8bb-109bb60ba20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21376", "type": "seen", "source": "https://t.me/cibsecurity/25322", "content": "\u203c CVE-2021-21376 \u203c\n\nOMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-23T19:38:34.000000Z"}, {"uuid": "c4c7d21f-4663-4089-bef5-23e33a3c9772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21377", "type": "seen", "source": "https://t.me/cibsecurity/25321", "content": "\u203c CVE-2021-21377 \u203c\n\nOMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-23T19:38:33.000000Z"}, {"uuid": "c8126e14-5415-4b9d-b0c6-bfb3076cb221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21378", "type": "seen", "source": "https://t.me/k8security/279", "content": "\u041a\u0430\u043a-\u0442\u043e \u044d\u0442\u043e \u043f\u0440\u043e\u0448\u043b\u043e \u043c\u0438\u043c\u043e \u043c\u0435\u043d\u044f, \u043d\u043e 2 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430\u0437\u0430\u0434 \u0432 Istio \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0437\u0430\u0431\u0430\u0432\u043d\u0443\u044e, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 (\u041f\u043e\u0434\u043e\u0431\u043d\u043e\u0435 \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0432\u0438\u0434\u0435\u0442\u044c \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0441 saml/oauth.), \u0432 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 JWT \u0442\u043e\u043a\u0435\u043d\u0430. \u0421\u0443\u0442\u044c: \"If a JWT token is presented with an issuer that does not match the issuer field specified in JwtProvider, then the request is mistakenly accepted\". \u041f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u0430 \u0431\u044b\u043b\u0430 \u0432\u0435\u0440\u0441\u0438\u044f 1.17, \u0430 \u0431\u043e\u043b\u0435\u0435 \u043c\u043b\u0430\u0434\u0448\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0435\u0442 (1.16 \u0438 \u043c\u043b\u0430\u0434\u0448\u0435). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2021-21378 \u0438 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 CVSS \u0440\u0435\u0439\u0442\u0438\u043d\u0433 8.2 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N.\n\nP.S. \u041d\u0435 \u043e\u0447\u0435\u043d\u044c \u043f\u043e\u043d\u044f\u0442\u043d\u043e \u043f\u043e\u0447\u0435\u043c\u0443 \u0430\u0432\u0442\u043e\u0440\u044b \u0432\u043e \u0432\u0441\u0435\u0445 \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u043a\u0430\u0445 \u044d\u0442\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u044e\u0442 \u043a\u0430\u043a \"fix for zero day\"... \u041c\u043e\u0436\u0435\u0442 \u043e\u043d\u0438 \u0432\u0438\u0434\u0435\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u043c\u0438\u0440\u0435 ?!", "creation_timestamp": "2021-04-30T07:37:38.000000Z"}]}