Skip to content

Commit 4c8acad

Browse files
1 parent 5e3d2b4 commit 4c8acad

File tree

2 files changed

+23
-3
lines changed

2 files changed

+23
-3
lines changed

advisories/github-reviewed/2025/03/GHSA-2xcr-p767-f3rv/GHSA-2xcr-p767-f3rv.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2xcr-p767-f3rv",
4-
"modified": "2025-03-21T22:46:39Z",
4+
"modified": "2025-07-15T00:32:25Z",
55
"published": "2025-03-20T12:32:53Z",
66
"aliases": [
77
"CVE-2025-27888"
88
],
99
"summary": "Apache Druid vulnerable to Server-Side Request Forgery, Cross-site Scripting, Open Redirect",
1010
"details": "Severity: medium (5.8) / important\n\nServer-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid.\n\nThis issue affects all previous Druid versions.\n\nWhen using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected.\n\nUsers are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N"

advisories/github-reviewed/2025/07/GHSA-6qjf-g333-pv38/GHSA-6qjf-g333-pv38.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6qjf-g333-pv38",
4-
"modified": "2025-07-14T17:55:06Z",
4+
"modified": "2025-07-15T00:33:21Z",
55
"published": "2025-07-14T17:55:06Z",
66
"aliases": [
77
"CVE-2025-53623"
@@ -40,9 +40,25 @@
4040
"type": "WEB",
4141
"url": "https://github.com/Shopify/job-iteration/security/advisories/GHSA-6qjf-g333-pv38"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53623"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/Shopify/job-iteration/pull/595"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/Shopify/job-iteration/commit/1a7adfdd041105a5e45e774cadc6b973a292ba55"
54+
},
4355
{
4456
"type": "PACKAGE",
4557
"url": "https://github.com/Shopify/job-iteration"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/Shopify/job-iteration/releases/tag/v1.11.0"
4662
}
4763
],
4864
"database_specific": {
@@ -52,6 +68,6 @@
5268
"severity": "HIGH",
5369
"github_reviewed": true,
5470
"github_reviewed_at": "2025-07-14T17:55:06Z",
55-
"nvd_published_at": null
71+
"nvd_published_at": "2025-07-14T20:15:29Z"
5672
}
5773
}

0 commit comments

Comments
 (0)