CVE-2024-37298 – Potential memory exhaustion attack due to sparse slice deserialization
https://notcve.org/view.php?id=CVE-2024-37298
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue. gorilla/schema convierte estructuras hacia y desde valores de formulario. Antes de la versión 1.4.1 La ejecución de `schema.Decoder.Decode()` en una estructura que tiene un campo de tipo `[]struct{...}` la abre a ataques maliciosos relacionados con las asignaciones de memoria, aprovechando la escasez de memoria. funcionalidad de corte. • https://github.com/gorilla/schema/blob/main/decoder.go#L223 https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 https://access.redhat.com/security/cve/CVE-2024-37298 https://bugzilla.redhat.com/show_bug.cgi?id=2295010 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2023-25058 – WordPress Schema – All In One Schema Rich Snippets Plugin <= 1.6.5 is vulnerable to Cross Site Request Forgery (CSRF)
https://notcve.org/view.php?id=CVE-2023-25058
Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force Schema – All In One Schema Rich Snippets plugin <= 1.6.5 versions. The Schema - All In One Schema Rich Snippets plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5. This is due to missing or incorrect nonce validation on the rich_snippet_dashboard function. This makes it possible for unauthenticated attackers to perform unauthorized configuration updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/all-in-one-schemaorg-rich-snippets/wordpress-schema-all-in-one-schema-rich-snippets-plugin-1-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2022-33154
https://notcve.org/view.php?id=CVE-2022-33154
The schema (aka Embedding schema.org vocabulary) extension before 1.13.1 and 2.x before 2.5.1 for TYPO3 allows XSS. La extensión schema (también se conoce como Embedding schema.org vocabulary) versiones anteriores a 1.13.1 y 2.x anteriores a 2.5.1 para TYPO3 permite un ataque de tipo XSS • https://typo3.org/security/advisory/typo3-ext-sa-2022-012 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-20977 – Schema - All In One Schema Rich Snippets <= 1.4.4 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2018-20977
The all-in-one-schemaorg-rich-snippets plugin before 1.5.0 for WordPress has XSS on the settings page. El pluginall-in-one-schemaorg-rich-snippets anterior a la versión 1.5.0 para WordPress tiene XSS en la página de configuración. • https://wordpress.org/plugins/all-in-one-schemaorg-rich-snippets/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •