Skip to content

Commit add3963

Browse files
1 parent a9c9466 commit add3963

File tree

3 files changed

+87
-12
lines changed

3 files changed

+87
-12
lines changed

advisories/unreviewed/2026/04/GHSA-497x-rrr9-68jp/GHSA-497x-rrr9-68jp.json renamed to advisories/github-reviewed/2026/04/GHSA-497x-rrr9-68jp/GHSA-497x-rrr9-68jp.json

Lines changed: 32 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,61 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-497x-rrr9-68jp",
4-
"modified": "2026-04-15T21:30:18Z",
4+
"modified": "2026-04-16T21:42:00Z",
55
"published": "2026-04-15T21:30:18Z",
66
"aliases": [
77
"CVE-2026-21726"
88
],
9+
"summary": "Grafana Loki Path Traversal - CVE-2021-36156 Bypass",
910
"details": "The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace}\n\nThanks to Prasanth Sundararajan for reporting this vulnerability.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/grafana/loki/v3"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.6.4"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21726"
2142
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/grafana/loki"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://grafana.com/security/security-advisories/cve-2026-21726"
2550
}
2651
],
2752
"database_specific": {
28-
"cwe_ids": [],
53+
"cwe_ids": [
54+
"CWE-601"
55+
],
2956
"severity": "MODERATE",
30-
"github_reviewed": false,
31-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-16T21:42:00Z",
3259
"nvd_published_at": "2026-04-15T20:16:34Z"
3360
}
3461
}

advisories/github-reviewed/2026/04/GHSA-gj7p-595x-qwf5/GHSA-gj7p-595x-qwf5.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gj7p-595x-qwf5",
4-
"modified": "2026-04-15T19:19:43Z",
4+
"modified": "2026-04-16T21:41:52Z",
55
"published": "2026-04-15T19:19:43Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-40939"
8+
],
79
"summary": "Data Sharing Framework is Missing Session Timeout for OIDC Sessions",
810
"details": "### Affected Components\nDSF FHIR Server with enabled [OIDC authentication](https://dsf.dev/operations/v2.1.0/fhir/oidc.html).\nDSF BPE Server with enabled [OIDC authentication](https://dsf.dev/operations/v2.1.0/bpe/oidc.html).\n\n### Summary\nOIDC-authenticated sessions had no configured maximum inactivity timeout. Sessions persisted indefinitely after login, even after the OIDC access token expired.\n\n### Impact\nIf a user logs in via OIDC and leaves their browser without explicitly logging out, the session remains valid indefinitely. Another person using the same browser can access the DSF UI with the previous user's permissions. This is a realistic threat in hospital environments with shared workstations.\n\nOnly affects OIDC browser sessions, not relevant for mTLS machine-to-machine communication.\n\n### Fix (commits f4ecb00, 7d25fea)\n- Added configurable session timeout via `dev.dsf.server.auth.oidc.session.timeout` (default: `PT30M`).\n- Enabled `logoutWhenIdTokenIsExpired(true)` in OpenID configuration to tie session lifetime to token lifetime.\n- Websocket sessions are now closed with `VIOLATED_POLICY` when credentials expire, prevents stale websocket connections from continuing to receive events after session timeout.",
911
"severity": [

advisories/unreviewed/2026/04/GHSA-m9hq-h476-h2g8/GHSA-m9hq-h476-h2g8.json renamed to advisories/github-reviewed/2026/04/GHSA-m9hq-h476-h2g8/GHSA-m9hq-h476-h2g8.json

Lines changed: 51 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,80 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m9hq-h476-h2g8",
4-
"modified": "2026-04-15T21:30:18Z",
4+
"modified": "2026-04-16T21:41:13Z",
55
"published": "2026-04-15T21:30:18Z",
66
"aliases": [
77
"CVE-2025-41118"
88
],
9+
"summary": "Exposure of Storage Secret in Pyroscope",
910
"details": "Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).\n\nIf the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyroscope API.\n\nTo exploit this vulnerability, an attacker needs direct access to the Pyroscope API. We highly recommend limiting the public internet exposure of all our databases, such that they are only accessible by trusted users or internal systems.\n\nThis vulnerability is fixed in versions:\n\n1.15.x: 1.15.2 and above.\n1.16.x: 1.16.1 and above.\n1.17.x: 1.17.0 and above (i.e. all versions).\n\nThanks to Théo Cusnir for reporting this vulnerability to us via our bug bounty program.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/grafana/pyroscope"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.15.2"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/grafana/pyroscope"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "1.16.0"
48+
},
49+
{
50+
"fixed": "1.16.1"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
1757
"references": [
1858
{
1959
"type": "ADVISORY",
2060
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41118"
2161
},
62+
{
63+
"type": "PACKAGE",
64+
"url": "https://github.com/grafana/pyroscope"
65+
},
2266
{
2367
"type": "WEB",
2468
"url": "https://grafana.com/security/security-advisories/cve-2025-41118"
2569
}
2670
],
2771
"database_specific": {
28-
"cwe_ids": [],
72+
"cwe_ids": [
73+
"CWE-200"
74+
],
2975
"severity": "CRITICAL",
30-
"github_reviewed": false,
31-
"github_reviewed_at": null,
76+
"github_reviewed": true,
77+
"github_reviewed_at": "2026-04-16T21:41:13Z",
3278
"nvd_published_at": "2026-04-15T20:16:32Z"
3379
}
3480
}

0 commit comments

Comments
 (0)