cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-38379,https://securityvulnerability.io/vulnerability/CVE-2024-38379,Allura's Neighborhood Settings Vulnerable to Stored XSS Attack,"Apache Allura's neighborhood settings are vulnerable to a stored XSS attack.  Only neighborhood admins can access these settings, so the scope of risk is limited to configurations where neighborhood admins are not fully trusted. This issue affects Apache Allura: from 1.4.0 through 1.17.0. Users are recommended to upgrade to version 1.17.1, which fixes the issue. ",Apache,Apache Allura,4.8,MEDIUM,0.0006200000061653554,false,,false,false,false,,,false,false,,2024-06-22T09:09:32.464Z,0 CVE-2024-36471,https://securityvulnerability.io/vulnerability/CVE-2024-36471,DNS Rebinding Vulnerability Affects Apache Allura Versions 1.0.1-1.16.0,"Import functionality is vulnerable to DNS rebinding attacks between verification and processing of the URL.  Project administrators can run these imports, which could cause Allura to read from internal services and expose them. This issue affects Apache Allura from 1.0.1 through 1.16.0. Users are recommended to upgrade to version 1.17.0, which fixes the issue. If you are unable to upgrade, set ""disable_entry_points.allura.importers = forge-tracker, forge-discussion"" in your .ini config file. ",Apache,Apache Allura,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-10T22:15:00.000Z,0 CVE-2023-46851,https://securityvulnerability.io/vulnerability/CVE-2023-46851,Apache Allura: sensitive information exposure via import,"Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution. This issue affects Apache Allura from 1.0.1 through 1.15.0. Users are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set ""disable_entry_points.allura.importers = forge-tracker, forge-discussion"" in your .ini config file. ",Apache,Apache Allura,4.9,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2023-11-07T09:15:00.000Z,0 CVE-2019-10085,https://securityvulnerability.io/vulnerability/CVE-2019-10085,,"In Apache Allura prior to 1.11.0, a vulnerability exists for stored XSS on the user dropdown selector when creating or editing tickets. The XSS executes when a user engages with that dropdown on that page.",Apache,Apache Allura,6.1,MEDIUM,0.0023300000466406345,false,,false,false,false,,,false,false,,2019-06-19T00:15:00.000Z,0 CVE-2018-1319,https://securityvulnerability.io/vulnerability/CVE-2018-1319,,"In Apache Allura prior to 1.8.1, attackers may craft URLs that cause HTTP response splitting. If a victim goes to a maliciously crafted URL, unwanted results may occur including XSS or service denial for the victim's browsing session.",Apache,Apache Allura,6.1,MEDIUM,0.0007999999797903001,false,,false,false,false,,,false,false,,2018-03-15T00:00:00.000Z,0 CVE-2018-1299,https://securityvulnerability.io/vulnerability/CVE-2018-1299,,"In Apache Allura before 1.8.0, unauthenticated attackers may retrieve arbitrary files through the Allura web application. Some webservers used with Allura, such as Nginx, Apache/mod_wsgi or paster may prevent the attack from succeeding. Others, such as gunicorn do not prevent it and leave Allura vulnerable.",Apache,Apache Allura,7.5,HIGH,0.0007200000109151006,false,,false,false,false,,,false,false,,2018-02-06T00:00:00.000Z,0