You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: security/index.html
+26
Original file line number
Diff line number
Diff line change
@@ -325,6 +325,32 @@ <h3 style="padding-left: 25px !important;" class="">How Are Vulnerabilities Hand
325
325
<h3style="padding-left: 25px !important; text-align: left;" class="">Security Vulnerabilities</h3>
326
326
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;">The section below contains a list of security vulnerabilities identified in the past releases. Those issues have been fixed in the latest release so you are always encouraged to run the latest release available.</p>
327
327
<div><br></div>
328
+
329
+
330
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>* [CVE-2022-44009] Improper RBAC check for K/V datastore access</strong><br></p>
331
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Severity:</strong> High<br></p>
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Description:</strong><br></p>
334
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;">Improper access control in Key-Value RBAC in StackStorm version 3.7.0 didn't check the permissions in Jinja filters, allowing attackers to access K/V pairs of other users, potentially leading to the exposure of sensitive Information. To exploit this vulnerability, the RBAC sould be enabled with K/V permissions rules and attacker should have a StackStorm user account.<br></p>
335
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Mitigation:</strong> This vulnerability has been fixed in StackStorm v3.8.0. You are strongly encouraged to upgrade to that release.<br></p>
336
+
<!--<p data-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Bug fix announcement blog post: <a href="#TBD" target="_blank">TBD</a><br></strong></p>-->
337
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Credits:</strong> This issue was discovered and reported to us by Guilherme Murad Pim.<br></p>
338
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><br></p>
339
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><br></p>
340
+
341
+
342
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>* [CVE-2022-43706] Web UI XSS via Rules injection</strong><br></p>
343
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Severity:</strong> High<br></p>
344
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Affected versions:</strong> All the versions prior to 3.8.0<br></p>
345
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Description:</strong><br></p>
346
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;">Cross-site scripting (XSS) vulnerability in the Web UI of StackStorm versions prior to 3.8.0 allowed logged in users with write access to pack rules to inject arbitrary script or HTML that may be executed in Web UI for other logged in users.<br></p>
347
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Mitigation:</strong> This vulnerability has been fixed in StackStorm v3.8.0. You are strongly encouraged to upgrade to that release.<br></p>
348
+
<!--<p data-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Bug fix announcement blog post: <a href="#TBD" target="_blank">TBD</a><br></strong></p>-->
349
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Credits:</strong> This issue was discovered and reported to us by Mohamed Elgllad.<br></p>
350
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><br></p>
351
+
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><br></p>
352
+
353
+
328
354
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>* [CVE-2021-44657] Jinja template without sandbox environment potentially leading to executing arbitrary code </strong><br></p>
329
355
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Severity:</strong> High<br></p>
330
356
<pdata-unit="px" style="line-height: 20px; margin-bottom: 5px !important; padding-left: 25px !important;"><strong>Affected versions:</strong> All the versions prior to 3.6.0<br></p>
0 commit comments