Skip to content

Commit 7c97662

Browse files
1 parent 86b76ce commit 7c97662

9 files changed

Lines changed: 60 additions & 19 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-7q3q-5px6-4c5p/GHSA-7q3q-5px6-4c5p.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7q3q-5px6-4c5p",
4-
"modified": "2026-03-11T00:37:44Z",
4+
"modified": "2026-03-11T21:37:49Z",
55
"published": "2026-03-11T00:37:44Z",
66
"aliases": [
77
"CVE-2026-31959"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/anchore/quill/security/advisories/GHSA-7q3q-5px6-4c5p"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31959"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/anchore/quill/commit/e41d66a517c2dc20ad8e9fbccffbdc6ba5ef0020"
@@ -65,6 +69,6 @@
6569
"severity": "MODERATE",
6670
"github_reviewed": true,
6771
"github_reviewed_at": "2026-03-11T00:37:44Z",
68-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-11T20:16:16Z"
6973
}
7074
}

advisories/github-reviewed/2026/03/GHSA-7vvp-j573-5584/GHSA-7vvp-j573-5584.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7vvp-j573-5584",
4-
"modified": "2026-03-11T19:23:43Z",
4+
"modified": "2026-03-11T21:37:27Z",
55
"published": "2026-03-11T19:23:43Z",
66
"aliases": [
77
"CVE-2026-31887"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-7vvp-j573-5584"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31887"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/shopware/shopware"
@@ -109,6 +113,6 @@
109113
"severity": "HIGH",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-03-11T19:23:43Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-03-11T19:16:04Z"
113117
}
114118
}

advisories/github-reviewed/2026/03/GHSA-9jfh-9xrq-4vwm/GHSA-9jfh-9xrq-4vwm.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9jfh-9xrq-4vwm",
4-
"modified": "2026-03-11T19:53:53Z",
4+
"modified": "2026-03-11T21:38:09Z",
55
"published": "2026-03-11T19:53:53Z",
66
"aliases": [
77
"CVE-2026-32094"
88
],
99
"summary": "Shescape escape() leaves bracket glob expansion active on Bash, BusyBox, and Dash",
1010
"details": "### Summary\n\n`Shescape#escape()` does not escape square-bracket glob syntax for Bash, BusyBox `sh`, and Dash. Applications that interpolate the return value directly into a shell command string can cause an attacker-controlled value like `secret[12]` to expand into multiple filesystem matches instead of a single literal argument, turning one argument into multiple trusted-pathname matches.\n\n### Details\n\nThe unquoted Unix escape helpers never add `[` or `]` to their “special characters” regexes:\n\n- `src/internal/unix/bash.js:14-30`\n- `src/internal/unix/busybox.js:14-30`\n- `src/internal/unix/dash.js:12-19`\n\nThey escape `*`/`?` but not brackets, so `new Shescape({ shell: \"/usr/bin/bash\" }).escape(\"secret[12]\")` still produces `secret[12]`. The fixtures (`test/fixtures/unix.js:2236-2265`, `3496-3525`, `5762-5792`) are currently written to expect literal brackets for these shells, confirming the behavior. The documentation recommends `Shescape#escape()` as the fallback for `exec` when quoting isn’t possible (`docs/recipes.md:154-183`).\n\n### Proof of Concept\n\nUse the published npm tarball without modifications:\n\n```shell\ntmp=$(mktemp -d)\ncd \"$tmp\"\nnpm pack shescape@2.1.9 >/dev/null\nmkdir pkg\ntar -xzf shescape-2.1.9.tgz -C pkg\ncd pkg/package\nnpm install --omit=dev\n\nnode --input-type=module - <<'NODE'\nimport { mkdtempSync, writeFileSync } from \"node:fs\";\nimport { tmpdir } from \"node:os\";\nimport path from \"node:path\";\nimport { execSync } from \"node:child_process\";\nimport { Shescape } from \"./src/index.js\";\n\nconst dir = mkdtempSync(path.join(tmpdir(), \"shescape-ghsa-poc-\"));\nwriteFileSync(path.join(dir, \"secret1\"), \"\");\nwriteFileSync(path.join(dir, \"secret2\"), \"\");\n\nfor (const shell of [\"/usr/bin/bash\", \"/usr/bin/dash\"]) {\n const shescape = new Shescape({ shell });\n const escaped = shescape.escape(\"secret[12]\");\n console.log(${shell} escaped=${escaped});\n const out = execSync(printf '<%s>\\\\n' ${escaped}, { cwd: dir, shell }).toString();\n process.stdout.write(out);\n}\nNODE\n```\n\nOutput:\n\n```text\n/usr/bin/bash escaped=secret[12]\n<secret1>\n<secret2>\n/usr/bin/dash escaped=secret[12]\n<secret1>\n<secret2>\n```\n\nExpected: the shell receives `secret\\[12\\]`, so only one literal argument runs.\n\n### Impact\n\nArgument injection: a single untrusted argument expands into multiple pathname matches from the trusted filesystem. This can change command behavior, target unintended files, or leak filenames. Any application calling `Shescape#escape()` with Bash/BusyBox/Dash shells and interpolating the result into a shell command string is affected.",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -35,6 +40,10 @@
3540
"type": "WEB",
3641
"url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-9jfh-9xrq-4vwm"
3742
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32094"
46+
},
3847
{
3948
"type": "WEB",
4049
"url": "https://github.com/ericcornelissen/shescape/pull/2410"
@@ -59,6 +68,6 @@
5968
"severity": "MODERATE",
6069
"github_reviewed": true,
6170
"github_reviewed_at": "2026-03-11T19:53:53Z",
62-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-11T20:16:17Z"
6372
}
6473
}

advisories/github-reviewed/2026/03/GHSA-c4p7-rwrg-pf6p/GHSA-c4p7-rwrg-pf6p.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c4p7-rwrg-pf6p",
4-
"modified": "2026-03-11T19:24:06Z",
4+
"modified": "2026-03-11T21:37:37Z",
55
"published": "2026-03-11T19:24:06Z",
66
"aliases": [
77
"CVE-2026-31889"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-c4p7-rwrg-pf6p"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31889"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/shopware/shopware"
@@ -109,6 +113,6 @@
109113
"severity": "HIGH",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-03-11T19:24:06Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-03-11T20:16:15Z"
113117
}
114118
}

advisories/github-reviewed/2026/03/GHSA-g32c-4pvp-769g/GHSA-g32c-4pvp-769g.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g32c-4pvp-769g",
4-
"modified": "2026-03-11T00:38:08Z",
4+
"modified": "2026-03-11T21:37:59Z",
55
"published": "2026-03-11T00:38:08Z",
66
"aliases": [
77
"CVE-2026-31960"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/anchore/quill/security/advisories/GHSA-g32c-4pvp-769g"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31960"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/anchore/quill/commit/9cdb0823ea1d2c45dcc11557f8c5cd7291c75d29"
@@ -64,6 +68,6 @@
6468
"severity": "MODERATE",
6569
"github_reviewed": true,
6670
"github_reviewed_at": "2026-03-11T00:38:08Z",
67-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-11T20:16:16Z"
6872
}
6973
}

advisories/github-reviewed/2026/03/GHSA-gqc5-xv7m-gcjq/GHSA-gqc5-xv7m-gcjq.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gqc5-xv7m-gcjq",
4-
"modified": "2026-03-11T19:23:49Z",
4+
"modified": "2026-03-11T21:37:32Z",
55
"published": "2026-03-11T19:23:49Z",
66
"aliases": [
77
"CVE-2026-31888"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-gqc5-xv7m-gcjq"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31888"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/shopware/shopware"
@@ -109,6 +113,6 @@
109113
"severity": "MODERATE",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-03-11T19:23:49Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-03-11T19:16:05Z"
113117
}
114118
}

advisories/github-reviewed/2026/03/GHSA-v53h-f6m7-xcgm/GHSA-v53h-f6m7-xcgm.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v53h-f6m7-xcgm",
4-
"modified": "2026-03-10T18:40:35Z",
4+
"modified": "2026-03-11T21:37:22Z",
55
"published": "2026-03-07T02:32:27Z",
66
"aliases": [
77
"CVE-2026-31900"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/psf/black/security/advisories/GHSA-v53h-f6m7-xcgm"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31900"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/psf/black/commit/0a2560b981364dde4c8cf8ce9d164c40669a8611"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-03-07T02:32:27Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-03-11T20:16:15Z"
6064
}
6165
}

advisories/github-reviewed/2026/03/GHSA-w54v-hf9p-8856/GHSA-w54v-hf9p-8856.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w54v-hf9p-8856",
4-
"modified": "2026-03-11T00:36:13Z",
4+
"modified": "2026-03-11T21:37:44Z",
55
"published": "2026-03-11T00:36:13Z",
66
"aliases": [
77
"CVE-2026-31901"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-w54v-hf9p-8856"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31901"
65+
},
6266
{
6367
"type": "PACKAGE",
6468
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +83,6 @@
7983
"severity": "MODERATE",
8084
"github_reviewed": true,
8185
"github_reviewed_at": "2026-03-11T00:36:13Z",
82-
"nvd_published_at": null
86+
"nvd_published_at": "2026-03-11T20:16:16Z"
8387
}
8488
}

advisories/github-reviewed/2026/03/GHSA-xj69-m9qq-8m94/GHSA-xj69-m9qq-8m94.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xj69-m9qq-8m94",
4-
"modified": "2026-03-11T00:38:00Z",
4+
"modified": "2026-03-11T21:37:54Z",
55
"published": "2026-03-11T00:38:00Z",
66
"aliases": [
77
"CVE-2026-31961"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/anchore/quill/security/advisories/GHSA-xj69-m9qq-8m94"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31961"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/anchore/quill/commit/80cf3fe082678af0ec4f9f8dd93f39189d2dc1fe"
@@ -64,6 +68,6 @@
6468
"severity": "MODERATE",
6569
"github_reviewed": true,
6670
"github_reviewed_at": "2026-03-11T00:38:00Z",
67-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-11T20:16:17Z"
6872
}
6973
}

0 commit comments

Comments
 (0)