CVE-2023-22419
https://notcve.org/view.php?id=CVE-2023-22419
As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. • https://jvn.jp/en/vu/JVNVU94966432 https://www.electronics.jtekt.co.jp/en/topics/202303035258 https://www.electronics.jtekt.co.jp/jp/topics/2023030313639 • CWE-125: Out-of-bounds Read •
CVE-2023-22421
https://notcve.org/view.php?id=CVE-2023-22421
As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. • https://jvn.jp/en/vu/JVNVU94966432 https://www.electronics.jtekt.co.jp/en/topics/202303035258 https://www.electronics.jtekt.co.jp/jp/topics/2023030313639 • CWE-125: Out-of-bounds Read •
CVE-2023-22424
https://notcve.org/view.php?id=CVE-2023-22424
As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. • https://jvn.jp/en/vu/JVNVU94966432 https://www.electronics.jtekt.co.jp/en/topics/202303035258 https://www.electronics.jtekt.co.jp/jp/topics/2023030313639 • CWE-416: Use After Free •
CVE-2023-22381 – Code injection in GitHub Enterprise Server leading to arbitrary environment variables in GitHub Actions
https://notcve.org/view.php?id=CVE-2023-22381
A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. • https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12 https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8 https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5 https://docs.github.com/en/enterprise-server@3.8/admin/release-notes • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-26477 – org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
https://notcve.org/view.php?id=CVE-2023-26477
XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue. • https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg https://jira.xwiki.org/browse/XWIKI-19757 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •